Skip to main content
. 2016 Nov 18;16(11):1932. doi: 10.3390/s16111932

Table 7.

Energy Consumption results.

Attack Node 1: Hardware Crypto + Attack Aware Firmware Node 2: Software Crypto + Insecure Firmware
Not Attacked graphic file with name sensors-16-01932-i001.jpg graphic file with name sensors-16-01932-i002.jpg
2.02 mWh 2.02 mWh
Replication Attack graphic file with name sensors-16-01932-i003.jpg graphic file with name sensors-16-01932-i004.jpg
1.93 mWh 4.48 mWh