In situations where it is not feasible for an adversary to physically capture and reprogram nodes in the network, he can use a laptop, which is more powerful in terms of computing and radio power to communicate with sensors and insert malicious code without moving to their locations or physically touching them.