... areassumed to be guaranteed, preventing attackers from spoofing, a ltering, or replaying data exchanged betweenobservers. These data include evidence and analysis out-put in addition to routing informati ... section. Due to the increasing use of wireless communication and net-work community interest in mobile computing, industry,and academia have granted a special attention to Mobile Ad hoc and Sensor ... tech-nique is tolerant to adversaries, that try to misle ad theinvestigation by injecting false information. It allowssuspicious areas, called hotspots, where some adversariesmay reside, to be detected....