By using different networks and devices as shown in figure you have just left your homes, mobile and bank information which have sensitive information open to hackers and thieves. Apart from the security present in the existing networks, there is a need to focus on the security aspects of all the devices involved in the communications like Sensor node, RFID, Laptops, Mobile, etc because of the resource constraints that these devices have.