protocols; telecommunication network routing; telecommunication network topology; wireless sensor networks; MACA protocol; adversarial wireless network; military application; route estimation; security application; security vulnerabilities; sensor networks; topolog;