ABSTRACT

In many wireless sensor network (WSN) application scenarios, security is a vital concern, especially the applications designed for WSNs deployed in hostile environments and commercial applications. The physical protection of the sensors in a network; tamper-proof methods, self-destruction method if cracked by attacker, shielding and camouflaging of sensors, and so on. A densely deployed sensor network may have redundancy in a small area, which could find out alternative ways of protecting the traffic flow, if attacked by attackers in one way or the other. The wireless medium is of open nature, hence the signaling and reception mechanisms must be secured in the best possible way. The actions or behaviors of nodes are compared with well-known attack patterns. The actions or behaviors of nodes are compared with well-known attack patterns. Multihop networks such as WSNs rely on an important assumption that all nodes in the network will faithfully forward the received messages to the base station.