% Authors : Barbara Kordy (barbara.kordy@uni.lu)
%           Patrick Schweitzer (patrick.schweitzer@uni.lu)
% Date : 25/06/2012
% (c) 2012 University of Luxembourg - Interdisciplinary Centre for Security 
% Reliability and Trust (SnT)
% All rights reserved

\documentclass{article}

\usepackage{ADT_web}
\usepackage{rotating}
\usepackage[labelformat=empty]{caption}
\pagestyle{empty}

%------------------------------------------------------------------------------
\begin{document}

\begin{sidewaysfigure}[htb]
\centering
\psscalebox{0.5}{
\pstree[levelsep=80pt,treesep=0.4cm]{\NNodeA{Root}{Remove\\Tag}}{
  \pstree{\NodeA{Remove\\Tag Self}}{
    \pstree{\NodeA{Infiltrate\\Building}}{
      \NodeAT{Breaking\\and\\Entering}{Figure 6}
      \NodeA{Pose\\as a\\Truck\\Driver}
      \pstree{\NNodeA{Post}{Postal\\Trojan\\Attack}}{
        \NNodeA{Post2}{Hide\\in a Box}
        \pstree{\NNodeA{Post3}{Be Sent\\to the\\Ware-\\house}}{
          \pstree{\NodeBC{Sniffer\\Dog}}{
            \pstree{\NodeAC{Confuse\\Dog}}{
              \NodeA{Distract\\Dog with\\Rats}
              \NodeA{Spray\\Pepper}
            }
          }
        }
      }
      \pstree{\NNodeA{Visitor}{Visitor\\Attack}}{
        \NNodeA{Visitor2}{Come as\\Visitor}
        \pstree{\NNodeA{Visitor3}{Hide in\\Bathroom}}{
          \pstree{\NodeBC{Track\\Visitors}}{
            \NodeB{Escort\\Visitors}
            \pstree{\NodeB{Register\\in\\Visitor's\\Log}}{
              \pstree{\NodeAC{Fake\\Log\\Entry}}{
                \NodeBC{Attended\\Visitor's\\Log}
              }
            }
            \NodeB{Attended\\Visitor's\\Log}
            \NodeB{Presence\\Detectors\\on\\Premesis}
          }
        }
      }
    }
    \pstree{\NodeA{Infiltrate\\Organi-\\sation}}{
      \NodeA{Get\\Hired as \\Warehouse\\Staff}
      \NodeA{Pose as \\Warehouse\\Employee}
      \NodeA{Buy the\\Warehouse}
      \NodeBC{Back-\\ground\\Check}
    }
  }
  \pstree{\NodeA{Other\\Person\\Removes\\Tag}}{
    \pstree{\NNodeA{Bribe}{Bribe}}{
      \NNodeA{Bribe2}{Identify\\Corruptible\\Subject}
      \NNodeA{Bribe3}{Bribe\\Subject}
      \pstree{\NNodeBC{Deter1}{Thwart\\Employees}}{
        \NNodeB{Deter2}{Security\\Awareness\\Training}
        \NNodeB{Deter3}{Threaten\\to Fire\\Employees}
      }
    }
    \NodeA{Threaten}
    \NodeA{Blackmail}
    \pstree{\NodeA{Trick}}{
      \pstree{\NodeA{Send\\False Re-\\placement\\Tag}}{
        \pstree{\NodeBC{Authenti-\\cate Tag}}{
          \NodeAC{Break\\Authenti-\\cation}
        }
      }
      \pstree{\NNodeA{Boss}{False\\Manage-\\ment\\Order}}{
        \NNodeA{Boss2}{Infiltrate\\Manage-\\ment}
        \NNodeA{Boss3}{Order\\Tag\\Replace-\\ment}
      }
      \NodeBC{Security\\Awareness\\Training}
    }
  }
  \NodeU{}
  \NodeBC{Attach\\with\\Stronger\\Adhesive}

\Arc{Deter1}{Deter2}{Deter3}
\Arc{Bribe}{Bribe2}{Bribe3}
\Arc{Boss}{Boss2}{Boss3}
\Arc{Post}{Post2}{Post3}
\Arc{Visitor}{Visitor2}{Visitor3}
}


%Legend
\rput(-34,-0.5){
  \begin{tabular}{|cl|}
  \hline
  \hspace{1ex}$\ACC$ & attack node\\
  \hspace{1ex}$\DCC$ & defense node\\
  \hspace{1ex}$\T$ & subtree\\
  \hspace{2ex}\psline[linewidth=0.5pt](0,.3)(-.3,0)
    \psline[linewidth=0.5pt](0,.3)(-.1,0)
    \psline[linewidth=0.5pt](0,.3)(.1,0)
    & disjunctive refinement\\
  \hspace{2ex}\psline[linewidth=0.5pt](0,.3)(-.3,0)
    \psline[linewidth=0.5pt](0,.3)(-.1,0)
    \psline[linewidth=0.5pt](0,.3)(.1,0)
    \psarc[linewidth=0.5pt](0,.3){0.2cm}{225}{288}
    & conjunctive refinement\\
  \hspace{1ex}\psline[linewidth=1pt,linestyle=dotted](0,.25)(0,-.05)
    & countermeasure\\
  \hline
  \end{tabular}
  }
}
\caption{How to remove an RFID tag?}
\label{fig:ADT_RFID_DOS}
\end{sidewaysfigure}

\end{document}