ABSTRACT

Contents 5.1 Introduction ................................................................................................................... 120

5.1.1 Chapter Roadmap................................................................................................121 5.2 Description of Scenarios ................................................................................................. 122

5.2.1 Types of Devices ................................................................................................. 122 5.2.2 Common Assumptions ....................................................................................... 122 5.2.3 Attacker Model ................................................................................................... 123 5.2.4 Scenario Analysis ................................................................................................ 124

5.2.4.1 Warehouse Monitoring ......................................................................... 124 5.2.4.2 Mobile Emergency Unit ........................................................................ 127 5.2.4.3 Building Monitoring ............................................................................ 128

5.2.5 Summary of Attacks ............................................................................................131 5.3 Middleware WSNProtectLayer: General Principles .........................................................131