International Journal of Computer Applications
Security and energy restriction are of most concern in pushing the success of Wireless Sensor Networks (WSNs) for their wide deployment. Despite years of much intensive research, deploying secure communication between wireless nodes remains the cumbersome setup process. Due to the deprived physical layout of sensor nodes, it is generally assumed that an adversary can capture and compromise a small number of sensors in the network. The key attack identified in such a network is Compromised Node (CN) attack which has the ability to create black hole, thereby intercepting the active information delivery.