3. Introduction
Uses tiny, in expensive sensor nodes
very low processing power and radio ranges
permit very low energy consumption
perform limited and specific monitoring and sensing
functions.
4. Application
Agriculture and livestock
Ocean and wildlife monitoring,
Manufacturing machinery performance monitoring,
Building safety and earthquake monitoring,
Many military applications.
Monitoring of highway traffic, pollution, wildfires,
building security, water quality , People’s heart rates.
6. Obstacles of Sensor Security
Very Limited Resources
Unreliable Communication
Unattended Operation
7. Very Limited Resources
Limited Memory and Storage Space
one common sensor type (TelosB) has an 16-bit, 8
MHz RISC CPU with only 10K RAM, 48K program
memory and 1024K flash storage
Power Limitation
10. Security Requirements
A sensor network is a special type of network. It
shares some commonalities with a typical computer
network, but also poses unique requirements.
Therefore, we can think of the requirements of a
wireless sensor network as encompassing both the
typical network requirements and the unique
requirements suited solely to wireless sensor
networks.
11. Attacks
Types of Denial of Service attacks
The Sybil attack
Traffic Analysis Attacks
Node Replication Attacks
Attacks Against Privacy
Physical Attacks