Node Compromise: The best way to counter node
compromise is to utilize code testing schemes which employ an
optimal program verification process to verify the memory of a
sensor node by calculating the hash values of randomly
selected memory regions. Another method suggested, detects
node compromise by comparing the previous position of nodes
with their current positions, assuming that node compromise
must be done by physically capturing a node, reprogramming
and then redeploying it in the network.