This summary provides the key details about the document in 3 sentences:
The document presents a technique to detect nodes that selectively drop or modify packets in wireless sensor networks. It proposes using a triple key distribution method where any three consecutive nodes on a routing path secure communications with each other. Simulation results showed that the proposed triple key method efficiently detects malicious nodes and identifies attacks earlier than some recently proposed approaches.