“…Many solutions have been devised for WSNs security, including (Karlof, C., Sastry, N., and Wagner, D., 2004) for secure communication, (Wong, C.K., Gouda, M., and Lam, S.S., 2000;Su, Z., Lin, C., Ren, F., Jiang, Y., and Chu, X., 2009;Gu, W., Dutta, N., Chellappan, S., and Xiaole, B., 2011;Maerien, J., Michiels, S., Huygens, C., and Joosen, W., 2010;Dini, G., and Tiloca, M., 2010) for key management, and (Hyun, S., Ning, P., Liu, A., and Du, W., 2008;Lanigan, P.E., and Gandhi, R., and Narasimhan, P., 2006) for secure code dissemination. Particular attention has been paid to component-based security architectures tailored to WSNs (Matthys, N., Huygens, C., Hughes, D., Michiels, S., and Joosen, W., 2012;Dini, G., and Savino, I.M., 2010).…”