ABSTRACT

Wireless sensor networks are receiving more and more attention these days. They allow us to collect data from noisy environments. Wireless sensor networks contain a bulky amount of sensor nodes that accumulate data plus information from their surroundings, as well as from added nodes. Sensor nodes are undersized devices that are proficient in sensing the data, the unfinished processing of data, and exchanging a few records with the other nodes or essential entities, such as the sink node or base station. The nodes are positioned in a variety of applications which involve supervising the behavior in the adjoining atmosphere. Sensor nodes play an essential role in supervising the remote areas, health, and hostile environments. In many applications, sensor nodes may contain data that should not be publicly accessible. There are many threats that may affect the security of the wireless sensor network. The minimum requirements for secure communication in sensor networks are confidentiality, integrity, and authentication.

Our major objective in Chapter 1 is to provide the readers with an overview of WSNs. An overview of the working principle and sensor nodes types entails that the network be ad hoc, self-organizing, and self-configurable in nature, and provide an architectural structure of the sensor network and protocol stack most of WSN appliances. The communication protocol and network architecture fulfills the above requirements, and then we transition the description of miscellaneous applications of the WSN. Next, we come up with security requirements and threats/attacks, routing protocols, WSN Standards, simulation tools, and operating systems that identify challenges while deploying the sensor networks.