“…In the context of wireless systems, message-based attacker models have been adopted in a number of works, e. g., in [11,15,16,22,24,25]. In these works, the attacker is usually assumed to be able to eavesdrop, insert, modify, replay, delay, or delete any signal being transmitted on the wireless channel.…”