You have full text access to this Open Access content

Security and Communication NetworksVolume 8, Issue 10, Version of Record online: 29 MAY 2014