%PDF-1.5
%
1 0 obj
<>
endobj
2 0 obj
<>
endobj
3 0 obj
<>stream
IEEE
2006 IEEE International Conference on Communications;2006;8; ;10.1109/ICC.2006.255595
On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks
Edith C. H. Ngai
Jiangchuan Liu
Michael R. Lyu
endstream
endobj
4 0 obj
<>stream
x+ |
endstream
endobj
5 0 obj
<>stream
xN@)RR;
nLkڹefO`NrJMO+d
˵A%OVm:qk.l0y!rێ8a4؉mM~l/%ݜTJ-RH"͊GEdGY^IOs`8sGM/:@*
endstream
endobj
6 0 obj
<>stream
x+ |
endstream
endobj
7 0 obj
<>stream
xn0s
1Pr
0 lxPO_F}=hit2Rnޠ9O&ﭡwqgbyC!r;[qC{6Z/osv]z(5c2 iO3
(pjkq&Ǘb=ʶ
M?@/
endstream
endobj
8 0 obj
<>stream
x+ |
endstream
endobj
9 0 obj
<>stream
xn0sl%@
h*'Z#q
V7U5h7?эԤ~<[K/>^=u!Al
-Q
lZd>5R_>hU*/9fKMY8tx_6DϧkJCߴ@)
endstream
endobj
10 0 obj
<>stream
x+ |
endstream
endobj
11 0 obj
<>stream
xn0s
ADk$)8(O_F}=ii|)2R.ޠ0[$kkhم83g|2G載9HՕ8ϡT؊`-Zb1+]FtP<BWQ88 ǧb=ʶC}B'@,
endstream
endobj
12 0 obj
<>stream
x+ |
endstream
endobj
13 0 obj
<>stream
xn0D+f RbZʎG*PWp7V1hљKM#OAW%w%,.\PX&C 97&vy=Z?R^_,u8+,O+A/Q9i)Ƕg`g|p|,֣lۺO0w*4iKO@.
endstream
endobj
14 0 obj
<>stream
x+ |
endstream
endobj
15 0 obj
<>stream
xn0D+f RbJ ʎG*PWp7V1hљKM#OAW%w%Y9}m
]ㇹ泱>BM
Ar,olMzH+~%XɿĿX|JCq:V(Yf$A/Q9i)Ƕg`g|p|,֣lۺO0w*4iKO@-
endstream
endobj
16 0 obj
<>stream
x+ |
endstream
endobj
17 0 obj
<>stream
xn0s
q
TEh5oj;4l>5Mv!)SD
E>n->pwsDc}ޛZXٚm-_H'%m:ƿX|+7@,tQy1ͱKNZʲĮkę5>8>Qu]3$hC]@+
endstream
endobj
18 0 obj
<>/ExtGState<>/ProcSet[/PDF/Text]/Pattern<>/Font<>>>/CropBox[0 0 612 792]/Parent 36 0 R/Rotate 0/MediaBox[0 0 612 792]>>
endobj
36 0 obj
<>
endobj
19 0 obj
<>stream
HWێ}[,`Z#.i&A0;j[vk,Y[=T"_:Aj*b9A^=|G7s4L~sQ?'j:QZw:-/ZUTLJM4M4zXgIornaYWi/G]s+b~.zWGdt=|,i)f)<iaao_{pOzb췡$Os, ?_I]ɴH-:N9F"Ӝ%V?x6Zm;Yu8s-G{Tޯbs5kԫg:ղ+nQٶt܊ j7S4qYq~Em
|ǓbΓpG CZz9a p)Qu3gJ6p?(ϯxv鋳Ln==SPMВ\}7eSǺhK;*8{@tLtGT%g!0gCۡ>liH2 yѝ|À{lZ4KdrKMÆMlG>.JX{gdOؗ1cpT0#DK:ѹ2m/T<}DEP2(Ah.o]N@"ΊFi{>uc*oLm+fAv/V"k!y"RoϰvPOm4tpҪ2묮n|5# TcgoɊ$m=좼i7Q·kP 'JN>s9)`r]k/wHLy5x)suޢ:Dz %ނu+?3̦Z?\9`h #\U&gr~$Q*U@ʐ`C9Sxf`:FZ2@̄L2ٛfwg}6@ߞY'뀹rdG{Fhy<#'y\ h-&6oүP[5ׁ)08G3?%x= h0T3&^칒4~*
_
H+c65L-%}#Cw(̋,(/@a