Le Wednesday 23 July 2008 17:47:52 이종덕, vous avez écrit : > In WSNs securiy area, many people expects that motes can be compromised by > adversary. Of course, it makes sense that adversary can pick up motes > because motes can be placed in insecure place. However, do they can get a > programming code from motes that they get? > > If mote A has encryption key in its code and adversary P gets mote A in the > field, P can get a programming code including encryption key from mote A? > Then, how?
this article discusses it ... Tampering with Motes: Real-World Attacks on Wireless Sensor Networks http://citeseer.ist.psu.edu/becher06tampering.html Cheers Aurélien _______________________________________________ Tinyos-help mailing list [email protected] https://www.millennium.berkeley.edu/cgi-bin/mailman/listinfo/tinyos-help
