However, this is not always the case, as malicious nodes can potentially be causing some damage, such as interference of messages, node impersonation, denial of service, spoofing, and eavesdropping among others.In this paper we use the classification proposed by Wang et al. [11] and Buiati et al. [12] to specify the security threats.(i)Address Spoofing Threat.