The document discusses techniques to secure wireless sensor networks in terms of delay, process time, and energy. It proposes two encryption techniques - a polynomial scheme and a Source Anonymous Message Authentication (SAMA) scheme - and evaluates their performance based on the three parameters. The polynomial scheme uses a verification polynomial to authenticate messages sent from a base station to sensor nodes. The SAMA scheme provides source anonymity and message authentication using elliptic curve cryptography. The methodology section describes the process of message sending, verification, and generation for each scheme. The document also discusses types of attacks on wireless sensor networks like hello flood attacks and Sybil attacks that can target different network layers. It is found that the SAMA scheme performs better in terms of delay, energy consumption