“…The objective of this model was to ensure data security during communication among sensors followed by a remote destination operator. Fathima et al [108], extend this discussion and proposed a unique signature based-authentication prototype for WSN applications utilizing a simplified encryption technique. However, this model was very complex, therefore, the chances of its real applicability are very limited.…”