You have full text access to this Open Access content

Security and Communication NetworksVolume 8, Issue 3, Version of Record online: 31 MAR 2014