Wireless sensor networks (WSNs) are wireless ad hoc networks of tiny sensor nodes. As a result of advances in sensor technology and wireless communication, sensor networks have emerged as an indispensable and important new tool for multiple civilian and military applications, including patient monitoring, wildlife monitoring, battlefield surveillance, enemy tracking, tracking contamination in hazardous environments, habitat monitoring in the nature preserves, traffic monitoring, surveillance of buildings, ecological and health related areas. Security is therefore important in WSNs. Wireless Sensor Networks are extremely vulnerable against any kind of internal or external attacks, due to several factors such as low computation capability, small memory, resource-constrained nodes and lack of tamper-resistant packages, limited energy resources, susceptibility to physical capture. These constraints make security challenging in WSNs.
Keywords: Wireless Sensor Networks (Wsns), Sensor, Security, Impersonation , Eavesdropping, Denial-
[...] We assume that locally sensor nodes have a transmission range of approximately 100 meters .In order to support ad hoc networking, we assume that the assignment of gateway nodes is determined at deployment and can be supported by any node in the network. Gateway nodes may contact relay points that transmit the signal even further (e.g., over a satellite link). Memory Sensor processors require different types of memory to perform various processing functions. ROM or EPROM is needed for storing the general purpose programming such as an embedded operation system, security functions, and basic networking capability. [...]
[...] key distribution, therefore it is extremely important to build a secure channel in a wireless sensor network. Public sensor information, such as sensor identities and public keys, should also be encrypted to some extent to protect against traffic analysis attacks. The standard approach for keeping sensitive data secret is to encrypt the data with a secret key that only intended receivers possess, thus achieving confidentiality. Integrity: Ensures that a message sent from one node to another is not modified by malicious intermediate nodes. [...]
[...] Hence, at the software level, sensor networks need new capabilities to ensure secure operation even in the presence of a small number of malicious network nodes. Node-to-node authentication is one basic building block for enabling network nodes to prove their identity to each other. Node revocation can then exclude malicious nodes. Achieving these goals on resource limited hardware will require lightweight - EAVESDROPPING In wireless sensor network communications, an adversary can gain access to private information by monitoring transmissions between nodes. [...]
[...] cost: For the deployment of sensor nodes in large numbers, a sensor node should be inexpensive. •Long lifetime network: An important characteristic of a sensor network is to design and implement efficient protocols so that the network can last as long as possible. Self-organization: Sensor nodes should be able to form a network automatically without any external configuration. Query and re-tasking: The user should be able to query for special events in a specific area, or remove obsolete tasks from specific sensors and assign them with new tasks. [...]
[...] I expect that the current and future work in privacy and trust will make wireless sensor networks a more attractive option in a variety of new arenas REFRENCES for Distributed Sensor Networking”, Brief presented at the DARPA Sensor IT Workshop, April Security in Distributed, Grid, and Pervasive Computing “Wireless Sensor Network Security: A Survey Paul Walters, Zhengqiang Liang. D. W. Carman, P. S. Krus, and B. J. Matt. Constraints and approaches for distributed sensor network security. Technical Report 00-010, NAI Labs, Network Associates, Inc., Glenwood, [...]
using our reader.