Research Article

An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things

Figure 1

An example of eavesdropping activities in WNoT, where there are several eavesdroppers who are wiretapping the confidential ongoing communications between RFID tags and RFID-readers.