In wireless networks the traffic from the source to the destination which is often routed through a number of nodes are often subject to a number of attacks, where intermediate nodes claim to transmit packets which were no transmitted. These nodes gain higher preferences or priorities the next time they act as the source. In order to tackle such threats a TP is assigned the task of gathering reports and evaluating whether they are genuine or not. This is accomplished in this paper by certain security techniques (hashing, signatures). The reports size is negligible thus large storage spaces are not required.