Krontiris and Dimitriou [16] focus on the MintRoute protocol
used in TinyOS and suggest rules that can be used by an
intrusion detection system to detect black hole attacks. Their
intrusion detection system is a rule-based system but these
rules would be typically implemented in programming code
to solve a particular problem and thus this intrusion detection
system may suffer from extensibility issues. Kachirski and
Guha [17] also propose an intrusion detection system for use
in wireless sensor networks. In this system, they use mobile
agents for network monitoring to increase modularity and
allow additional functionality to be built into the IDS with
minimal effort