“…The common security threats include information disclosure, message injection, sleep deprivation attack etc [5]. An attacker may capture and compromise a node and thus be able to control some part or even the whole network exclusively [5]. For example, in a sleep deprivation attack the intruder makes a node or a set of nodes to remain busy; so that they waste their energy while carrying out the task for the intruders [6].…”