To perform this coordination a secure communication
channel should be established between participants
using a shared session key agreed with all participants. The
protocol should allow only legitimate members of the attack to
participate (prevent adversaries’ interference).