Veronica Eyo Sharvari Joshi The nodes are left unattended An Adversary can physically compromise the nodes Solution? Authentication and cryptographic mechanisms alone can…