In WSNs securiy area, many people expects that motes can be compromised by
adversary. Of course, it makes sense that adversary can pick up motes
because motes can be placed in insecure place. However, do they can get a
programming code from motes that they get?
If mote A has encryption key in its
Hello!
I am currently trying to use AES-192 or AES-256 in CC2420, but seems very
hard to do it.
Does anyone have any idea about it?
Thank you,
JD
___
Tinyos-help mailing list
Tinyos-help@millennium.berkeley.edu