GV Crosby, N Pissinou, J Gadze - Second IEEE Workshop on …, 2006 - ieeexplore.ieee.org
The election of a malicious or compromised node as the cluster head is one of the most
significant breaches in cluster-based wireless sensor networks. In light of this, we are …