... Pre-distribution Sybil Attack Traditional wireless sensor network Uses radio resource, Random key pre-distribution, Registration procedure, Position verification and code attestation for detecting ... information, which may be accepted by receiving nodes. Applications deployed in a WSN, for example, environmental monitoring or object tracking, can be disrupted by the false information. Routing ... authentication is necessary during exchange of control information in the network. The standard approach for keeping authenticity is through the use of message authentication code, challenge response,...