You have full text access to this OnlineOpen article

Security and Communication NetworksVolume 7, Issue 12, Article first published online: 27 JUN 2013