Practical security scheme design for resource-constrained wireless networks