... in mobile computing, industry, and academia have granted a special attention to Mobile Ad hoc and Sensor Networks (MASNets) The inherent characteristics of these networks, including the broadcast ... digital investigation of security attacks in the context of mobile ad hoc and sensor networks, which is composed of four main steps In the first step, the node in charge of investigation starts ... First, attacks are mobile, meaning that during an attack scenario, the attacker can change its identity, position, location, and point of access Using a formal model of digital investigation in wireless...