You have full text access to this Open Access content

Security and Communication NetworksVolume 6, Issue 2, Version of Record online: 28 JAN 2013