ABSTRACT

Once deployed, possibly in a remote environment, DCSNs are typically left unattended, with occasional human visits, and can create vast quantities of information. The characteristic of little physical protection combined with their low-cost nature makes DCSNs vulnerable to a wide variety of network dynamics and attacks, including node capture, node compromise, node failure, packet injections, jamming attacks, and so on. As a result, an adversary may breach data privacy by acquiring sensitive data stored in the network through compromising nodes, or may affect data availability by removing

data permanently via disabling network nodes. For instance, in a DCSN that is deployed in a forest for monitoring and tracking endangered animals, obtaining the stored data will reveal location information about targets, which may create life-threatening risks.