In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, detection and isolation of the same intruder or its clones may have to be conducted repeatedly, wasting scarce network resources. Therefore, once an intruder is identified, it should be… (More)
Protocol design, implementation and integration for the protection of sensor data confidentiality and integrity" (2008). Retrospective Theses and Dissertations. Paper 15417.