You have full text access to this Open Access content

Security and Communication NetworksVolume 6, Issue 3, Version of Record online: 10 MAY 2012