Due to resource constraint nature of sensor nodes, the network suffers by computation and security problems. These nodes create a wireless sensor network that used sink stable or mobile as per required applications. Therefore, various traditional security techniques of the traditional networks are not possible to be applied on this network. To overcome the security problem in this ad-hoc or wir...