This document discusses security threats and challenges in wireless sensor networks. It outlines various threats including passive information gathering, node subversion, false nodes, node malfunctions, message corruption and denial of service attacks. It also describes different key distribution techniques for sensor networks such as single network keys, asymmetric cryptography, pairwise keys, and base station based key distribution. Random key predistribution schemes are explained where sensors are loaded with random keys before deployment. The document also discusses watermarking techniques that can be used to authenticate data collected by sensor networks through modulating sensor parameters or embedding signatures during data processing.
Related topics: