I. Introduction
Wireless sensor networks (WSNs) have attracted a lot of attention recently due to their broad applications in both military and civilian operations. Many WSNs are deployed in unattended and often hostile environments such as military and homeland security operations. Therefore, security mechanisms providing confidentiality, authentication, data integrity, and nonrepudiation, among other security objectives, are vital to ensure proper network operations.