It is of paramount importance to have a mechanism of alienating any suspicious node from a network before it leads to any damage. In this form of attack which is popularly referred to as camouflage attack, the attacker first compromises an existing sensor node or inserts a malicious node with an intention of later using it. Once this node joins the network, it will exchange and route messages with the other nodes as a legitimate node, allowing the attacker to gather, modify or inject data.