The multihop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replayingrouting information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routingprotocols, including sinkhole attacks, wormhole attacks, and Sybil attacks. The situation is further aggravated by mobile and harshnetwork conditions. Traditional cryptographic techniques […]