1. Again based on 1 above, is it possible to continue operating a sensor network with a selected number of sensors taken out? Is it possible to identify those nodes?
2. Devise ways (some cryptographic) of securing wireless communication links against eavesdropping, tampering, traffic analysis, and denial of service.
3. Is it possible to design an asymmetric encryption protocol with all computations based on the base station?