% Authors : Barbara Kordy (barbara.kordy@uni.lu)
%           Patrick Schweitzer (patrick.schweitzer@uni.lu)
% Date : 25/06/2012
% (c) 2012 University of Luxembourg - Interdisciplinary Centre for Security 
% Reliability and Trust (SnT)
% All rights reserved

\documentclass{article}

\usepackage{ADT_web}
\usepackage{rotating}
\usepackage[labelformat=empty]{caption}
\pagestyle{empty}

%------------------------------------------------------------------------------
\begin{document}

\begin{sidewaysfigure}[htb]
\centering
\psscalebox{0.35}{
\pstree[levelsep=80pt,treesep=0.4cm]{\NNodeA{Root}{RFID\\DoS\\Attack}}{
  \pstree{\NNodeA{Root}{Remove\\Tag}}{
  \pstree{\NodeA{Remove\\Tag Self}}{
    \pstree{\NodeA{Infiltrate\\Building}}{
      \pstree{\NNodeA{Root}{Breaking\\and\\Entering}}{
  \pstree{\NNodeA{BE1}{Get\\onto\\Premises}}{
    \pstree{\NNodeA{Block1}{Climb\\over\\Fence}}{
        \pstree{\NNodeBC{Shield1}{Barbed\\Wire}}{
          \pstree{\NodeAC{Guard\\Against\\Barbs}}{
            \NodeA{Use\\Carpet\\on Barbs}
            \NodeA{Wear\\Protective\\Clothing}
          }
        }
      }
      \NodeA{Enter\\through\\Gate}
    }
  \pstree{\NNodeA{BE2}{Get\\into\\Ware-\\house}}{
    \pstree{\NodeA{Enter\\through\\Door}}{
      \NodeBC{Monitor\\with\\Biometric\\Sensors}
    }
    \NodeA{Enter\\through\\Loading\\Dock}
  }
  \pstree{\NodeBC{Monitor\\with\\Security\\Cameras}}{
    \pstree{\NodeAC{Disable\\Cameras}}{
      \pstree{\NodeA{Laser\\Cameras}}{
      }
      \pstree{\NodeA{Video\\Loop\\Cameras}}{
        \NodeBC{Employ\\Guards}
      }
    }
  }
}
\Arc{Root}{BE1}{BE2}
      \NodeU{}
      \NodeA{Pose\\as a\\Truck\\Driver}
      \pstree{\NNodeA{Post}{Postal\\Trojan\\Attack}}{
        \NNodeA{Post2}{Hide\\in a Box}
        \pstree{\NNodeA{Post3}{Be Sent\\to the\\Ware-\\house}}{
          \pstree{\NodeBC{Sniffer\\Dog}}{
            \pstree{\NodeAC{Confuse\\Dog}}{
              \NodeA{Distract\\Dog with\\Rats}
              \NodeA{Spray\\Pepper}
            }
          }
        }
      }
      \pstree{\NNodeA{Visitor}{Visitor\\Attack}}{
        \NNodeA{Visitor2}{Come as\\Visitor}
        \pstree{\NNodeA{Visitor3}{Hide in\\Bathroom}}{
          \pstree{\NodeBC{Track\\Visitors}}{
            \NodeB{Escort\\Visitors}
            \pstree{\NodeB{Register\\in\\Visitor's\\Log}}{
              \pstree{\NodeAC{Fake\\Log\\Entry}}{
                \NodeBC{Attended\\Visitor's\\Log}
              }
            }
            \NodeB{Attended\\Visitor's\\Log}
            \NodeB{Presence\\Detectors\\on\\Premesis}
          }
        }
      }
    }
    \pstree{\NodeA{Infiltrate\\Organi-\\sation}}{
      \NodeA{Get\\Hired as \\Warehouse\\Staff}
      \NodeA{Pose as \\Warehouse\\Employee}
      \NodeA{Buy the\\Warehouse}
      \NodeBC{Back-\\ground\\Check}
    }
  }
  \pstree{\NodeA{Other\\Person\\Removes\\Tag}}{
    \pstree{\NNodeA{Bribe}{Bribe}}{
      \NNodeA{Bribe2}{Identify\\Corruptible\\Subject}
      \NNodeA{Bribe3}{Bribe\\Subject}
      \pstree{\NNodeBC{Deter1}{Thwart\\Employees}}{
        \NNodeB{Deter2}{Security\\Awareness\\Training}
        \NNodeB{Deter3}{Threaten\\to Fire\\Employees}
      }
    }
    \NodeA{Threaten}
    \NodeA{Blackmail}
    \pstree{\NodeA{Trick}}{
      \pstree{\NodeA{Send\\False Re-\\placement\\Tag}}{
        \pstree{\NodeBC{Authenti-\\cate Tag}}{
          \NodeAC{Break\\Authenti-\\cation}
        }
      }
      \pstree{\NNodeA{Boss}{False\\Manage-\\ment\\Order}}{
        \NNodeA{Boss2}{Infiltrate\\Manage-\\ment}
        \NNodeA{Boss3}{Order\\Tag\\Replace-\\ment}
      }
      \NodeBC{Security\\Awareness\\Training}
    }
  }
  \NodeU{}
  \NodeBC{Attach\\with\\Stronger\\Adhesive}

\Arc{Deter1}{Deter2}{Deter3}
\Arc{Bribe}{Bribe2}{Bribe3}
\Arc{Boss}{Boss2}{Boss3}
\Arc{Post}{Post2}{Post3}
\Arc{Visitor}{Visitor2}{Visitor3}
}
  \NodeU{}
  \NodeA{Disable\\Tag}
  \NodeU{}
  \NodeA{Overload\\Tag}
  \NodeU{}
  \NodeA{Disable\\Reader}
  \NodeU{}
  \NodeA{Disable\\Backend}
  \pstree{\NNodeA{Child5}{Block\\Communi-\\cation}}
{
    \pstree{\NodeA{Block\\Tag\\Reader}}{
      \pstree{\NNodeA{Block1}{Shield\\Tag}}{
        \pstree{\NNodeA{Shield1}{Be in\\Vicinity\\of Tag}}{
          \NodeBC{Secure\\Ware-\\house}
        }
        \pstree{\NNodeA{Shield2}{Faraday\\Cage}}{
          \NodeA{Cage\\Around\\Reader}
          \NodeA{Cage\\Around\\Tag}
        }
      }
      \NodeA{Blocker\\Reader}
      \NodeA{Blocker\\Tag}
      \pstree{\NodeA{Jam\\Signal}}{
        \pstree{\NodeBC{Isolate\\Network}}{
          \NodeB{Secure\\Ware-\\house}
          \NodeB{Faraday\\Around\\Tag and\\Reader}
        }
      }
    }
    \pstree{\NodeA{Block\\Reader\\Backend}}{
      \pstree{\NodeA{DoS in\\Network}}{
      }
    }
    
  }

\Arc{Block1}{Shield1}{Shield2}
}
%Legend
\rput(-55,-1){
  \begin{tabular}{|cl|}
  \hline
  \hspace{1ex}$\ACC$ & attack node\\
  \hspace{1ex}$\DCC$ & defense node\\
  \hspace{2ex}\psline[linewidth=0.5pt](0,.3)(-.3,0)
    \psline[linewidth=0.5pt](0,.3)(-.1,0)
    \psline[linewidth=0.5pt](0,.3)(.1,0)
    & disjunctive refinement\\
  \hspace{2ex}\psline[linewidth=0.5pt](0,.3)(-.3,0)
    \psline[linewidth=0.5pt](0,.3)(-.1,0)
    \psline[linewidth=0.5pt](0,.3)(.1,0)
    \psarc[linewidth=0.5pt](0,.3){0.2cm}{225}{288}
    & conjunctive refinement\\
  \hspace{1ex}\psline[linewidth=1pt,linestyle=dotted](0,.25)(0,-.05)
    & countermeasure\\
  \hline
  \end{tabular}
  }

}
\caption{DoS attack on an RFID system in a warehouse.}
\label{fig:ADT_RFID_DOS}
\end{sidewaysfigure}

\end{document}