560 likes | 738 Vues
2. Outline. AvailabilityPrivacyIntegrityLegitimate ParticipantsAbsence of misbehavior. Security Requirements. Availabilityno jamming, adaptability to unforeseen topologiesPrivacynondisclosure of cell phone communications and 802.11 framesIntegritydata is not intercepted and tamperedLegitim
E N D