International Journal of Emerging Technology and Advanced Engineering (IJETAE)
Wireless Sensor Networks (WSNs) have been extensively used in various applications such as environmental monitoring, industrial monitoring, agriculture, green house monitoring, structural monitoring, passive localization and tracking, battlefield surveillance, etc. Sensor nodes in these applications are required to sense and process the physical conditions like temperature, pressure, humidity, rainfall, fog, etc. and route the data to a predefined base station or a sink node. In most of these applications, sensor nodes are deployed in public domain and they are prone to be attacked by many types of attacks where in the data confidentiality, integrity and authentication are compromised.