You have full text access to this Open Access content

Security and Communication NetworksVolume 5, Issue 12, Version of Record online: 8 FEB 2012