Visual Tour

Attack-aware firmware design with the WSN simulator

Replication Attack effects in a WSN (secure vs insecure)