Text this: Investigation of techniques for combating malicious objects in unreliable wireless sensor networks