Attacks where adversaries have full control of a number of . authenticated devices and behave arbitrarily to disrupt the . network are referred to as Byzantine attacks [3].Once the active. set of insider nodes in the network are turned to be malicious by. the attackers then the whole network will be under the control.