Research Article
An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things
Figure 1
An example of eavesdropping activities in WNoT, where there are several eavesdroppers who are wiretapping the confidential ongoing communications between RFID tags and RFID-readers.