% Authors : Barbara Kordy (barbara.kordy@uni.lu)
%           Patrick Schweitzer (patrick.schweitzer@uni.lu)
% Date : 25/06/2012
% (c) 2012 University of Luxembourg - Interdisciplinary Centre for Security 
% Reliability and Trust (SnT)
% All rights reserved

\documentclass{article}

\usepackage{ADT_web}
\usepackage[labelformat=empty]{caption}
\pagestyle{empty}

%------------------------------------------------------------------------------
\begin{document}

\begin{figure}[htb]
\centering
\psscalebox{1}{
\pstree[levelsep=80pt,treesep=0.4cm]{\NNodeA{Root}{RFID\\DoS\\Attack}}{
  \NodeA{Remove\\Tag}
  \NodeA{Disable\\Tag}
  \NodeA{Overload\\Tag}
  \NodeA{Disable\\Reader}
  \NodeA{Disable\\Backend}
  \NodeA{Block\\Communi-\\cation}
}
%Legend
\rput(-2.5,0.5){
  \begin{tabular}{|cl|}
  \hline
  \hspace{1ex}$\ACC$ & attack node\\
  \hspace{2ex}\psline[linewidth=0.5pt](0,.3)(-.3,0)
    \psline[linewidth=0.5pt](0,.3)(-.1,0)
    \psline[linewidth=0.5pt](0,.3)(.1,0)
    & disjunctive refinement\\
  \hline
  \end{tabular}
  }
}
\caption{DoS attack on an RFID system.}
\label{fig:ADT_RFID_DOS}
\end{figure}

\end{document}