ABSTRACT

This chapter provides an overview of several types of attacks commonly found in sensor networks and techniques and protocols to defend a network or to detect an intrusion or compromised node. It investigates security-related issues in wireless sensor networks (WSNs). The requirements of a WSN as encompassing both the typical network demands and the unique necessities suited solely to WSNs. WSNs are exposed to a variety of threats and attacks and as most other networks, sensor networks require support for confidentiality, integrity, and authentication to protect sensor nodes and sensor data. The requirement of security not only affects the operation of the network but also is highly important in maintaining the availability of the whole network. A more collaborative sensor network may require group synchronization for tracking applications. Many sensor networks are attractive targets for attackers due to the nature of many WSNs applications and the sensitive data they generate.