You have full text access to this Open Access content

Security and Communication NetworksVolume 8, Issue 5, Version of Record online: 5 MAY 2014