ABSTRACT

Although sensor networks are supposed to be highly independent and require little supervision, sensor networks deployed in hostile environment are subjected to all kinds of attacks. For example, in ColTraNe [1], sensors are deployed in hostile terrain to track the movements of enemy tanks. Attacks could be initialized by the enemy to maliciously capture, modify the compromised sensor nodes, or even inject information to them.