attacks are committed by transmitting a continuous stream of
messages with a view to generate collisions. These collisions
lead sensors to retransmit messages indefinitely and render
them inoperative by exhausting battery power. As a result, the
sensors consume their valuable computational resources, such
as bandwidth and processor time. Other problems include
disruption of configuration information, such as routing
information, and obstruction of the communication media
between the intended users so that they can no longer
communicate adequately.