Assumptions about attackers critically influence security and efficiency of protocols. Without precisely defined attacker models, proving security of protocols becomes impossible. Especially the area of sensor network security lacks well-established and precise attacker models. We present a general framework for attacker models in wireless sensor networks that structures and orders typical assumptions about attackers.
it - Information Technology is a strictly peer-reviewed scientific journal. It is the oldest German journal in the field of information technology. Today, the major aim of it - Information Technology is highlighting issues on ongoing newsworthy areas in information technology and informatics and their application. It aims at presenting the topics with a holistic view.