The rest of this paper is organized as follows: Section 2
gives background on black hole attacks in sensor networks
and the mitigating strategies that other researchers have used.
Section 3 describes the architecture of ADIOS and details
strategies for reducing resource consumption. Section 4 shows
the results obtained from our simulations and does an analysis
on the significance of these results. Section 5 concludes the
paper by summarizing our findings and suggesting areas for
future work.