Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes ABSTRACT: Compromised-node and denial-of-service are two key attacks in wireless sensor…
1. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 5, MAY 2012793A Trigger Identification Service for Defending Reactive Jammers in WSNYing Xuan, Yilin Shen, Nam P. Nguyen,…