560 likes | 751 Views
2. Outline. AvailabilityPrivacyIntegrityLegitimate ParticipantsAbsence of misbehavior. Security Requirements. Availabilityno jamming, adaptability to unforeseen topologiesPrivacynondisclosure of cell phone communications and 802.11 framesIntegritydata is not intercepted and tamperedLegitim
E N D