In many applications the data obtained by the sensing nodes need to be authentic [5]. A false or
malicious node could intercept private information in the absence of proper security or could send
false messages to nodes in the network. Different possible attacks can be categorized as follows