An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
In this paper, we propose a novel, cluster-based energy balancing scheme. We assume the existence of a fraction of “strong” nodes in terms of abundant storage, computing and co...