Routing in sensor networks is complicated due to several issues ranging from security to energy constraints of wireless sensor nodes. This distinguishes them from contemporary wireless ad hoc networks. Adversaries can launch DoS attacks by injecting false data reports via compromised nodes. Previously a hill climbing key dissemination filtering scheme was developed where each node disseminates its key to forwarding nodes and later transmits reports along with the key. The forwarding nodes validate the credibility of the reports based on the key obtained earlier.