researchers worldwide in the past few years, so does the need for effective security
mechanisms. The sensing technology combined with processing power and wireless
communication makes it lucrative for being exploited in abundance in future. The inclusion
of wireless communication technology also incurs various types of security threats due to
unattended installation of sensor nodes as sensor networks may interact with sensitive data …