You have full text access to this OnlineOpen article

Security and Communication NetworksVolume 6, Issue 1, Version of Record online: 17 MAY 2012