ABSTRACT

Among various evaluation criteria of wireless sensor networks (WSNs), the issue of security about sensor networks has attracted a great deal of attention over the previous decades. An adversary can compromise a sensor network by launching remote, so¯ware-based attacks, or physical attacks.