Le Wednesday 23 July 2008 17:47:52 이종덕, vous avez écrit :
> In WSNs securiy area, many people expects that motes can be compromised by
> adversary. Of course, it makes sense that adversary can pick up motes
> because motes can be placed in insecure place. However, do they can get a
> programming code from motes that they get?
>
> If mote A has encryption key in its code and adversary P gets mote A in the
> field, P can get a programming code including encryption key from mote A?
> Then, how?

this article discusses it ...
Tampering with Motes: Real-World Attacks on Wireless Sensor Networks
http://citeseer.ist.psu.edu/becher06tampering.html

Cheers 
Aurélien

_______________________________________________
Tinyos-help mailing list
[email protected]
https://www.millennium.berkeley.edu/cgi-bin/mailman/listinfo/tinyos-help

Reply via email to