ABSTRACT

Wireless sensor networks are an important tool in security-sensitive scenarios, such as battle ¢eld surveillance, nuclear and chemical attack detection, intrusion detection, ºood detection, weather forecasting, tra«c surveillance, and patient monitoring [1]. In such scenarios, protecting the network from adversaries who seek to undermine the network’s operations or steal its sensitive information is critical to the network’s mission.