Q Zhang, T Yu, P Ning - 2nd International ICST Conference on Security and …, 2007 - eudl.eu
Sensor networks are often subject to physical attacks. Once a node's cryptographic key is
compromised, an attacker may completely impersonate it, and introduce arbitrary false …