Professional Documents
Culture Documents
INTRODUCTION
1
topology of secure links in the wireless network. Hence, the impact of a
node capture attack is a function of both the cryptographic protocol which
provides link security and the routing protocol which determines the set
of links traversed by a given message.