Return to Article Details A Novel Security Analysis against Impersonation Attacks for Distributed Systems Download Download PDF