Date Added: Apr 2013
Due to the rapid development of wireless sensor devices in terms of low power and inexpensive data-relaying has been partially achieved because of the rapid progress in integrated circuits and radio transceiver designs and device technology. Because of this, the wireless sensor devices are able to gather information, process them if required and send them to the next sensor device. The resource constrained ad hoc wireless sensor network is versatile yet vulnerable to attacks. The communication infrastructure with less sensor networks may interact with the sensitive data in the hostile environment where the nodes may fail and new nodes may join the network, which may leads to the susceptibility to many kinds of security attacks.