Abstract
A threat model for sensor networks and mobile ad hoc networks (MANETs) is introduced. Components that can be used to form an adversary model are developed. Threat categories, modes of use, and a variety of threats to system assets are identified, including threats to communications, infrastructure services, individual nodes and human users. Example envisaged applications of the threat model are discussed, covering threats to secure information flows, to threshold and identity based cryptography and to risk and trust management.
Original language | English |
---|---|
Publication status | Published - 2007 |