“…Attackers can also impersonate network nodes by counterfeiting, and conceal legitimate users to execute unauthorized operations. The active attacks include jamming attack [15], denial of service attack, black hole attack [16], tampering attack, wormhole attack [17], selective forwarding, identity replication/cloning attack [18], Sybil attack [19], etc. The passive attack is difficult to detect for the simple reason that the attacker only monitors the transmitted data without modifying the message.…”