“…In particular, it is easy to eavesdrop or cause a network layer attacks which fall into one of the following categories: manipulating routing information, selective forwarding, Sybil, sinkhole, wormhole, and Hello flooding (unidirectional) attacks. Furthermore, most real-time communication and coordination routing protocols do not address security, so it is easy for an adversary to exploit those routing protocols on a given WSNs [5,6]. Lightweight security schemes are required in real-time routing protocols for WSN.…”