Chapter 15
Security in Wireless Sensor Networks
Jaydip Sen
Contents
15.2 Constraints in Wireless Sensor Networks
15.3 Security Requirements in Wireless Sensor Networks
15.4 Security Vulnerabilities in Wireless Sensor Networks
15.4.1 Denial-of-Service Attacks
15.4.1.1 Physical Layer Attacks
15.4.1.3 Network Layer Attacks
15.4.1.4 Transport Layer Attacks
15.4.2 Attacks on Secrecy and Authentication
15.4.2.1 Node Replication Attack
15.5 Security Mechanisms for Wireless Sensor Networks
15.5.1 Cryptography in Wireless Sensor Networks
15.5.1.1 Public Key Cryptography in Wireless Sensor Networks
Get Wireless Sensor Networks now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.