Wireless sensor network have become widely used in many civil and military issues.
Like all other network, it is exposed to attacks but its simplicity structured (CPU &
memory) prevent the traditional defense technic to be applied, so they need a s
pecial for
defense.
Most security researches focus on data righteousness and privacy, in this research we
focus on attacks that aimed to the power resources which are referred as Denial Of Sleep
attacks (DoS), in this attacks the attacker try to keep the sensor in active phase causing the
power source to be drained very quickly so that it is a very dangerous attack.
In this research we reviewed the sources of energy Loss in wireless sensor network
and classified the attacks that target the power resource, we built a simulation module to
analysis the B-MAC protocol response to denial of sleep attacks.
Key management in Wireless Sensor Networks (WSNs) is an important issue due to the absence
of trusted infrastructures, on one hand, and the limited resources of sensor nodes, on the other
hand. This paper surveys some recent key management approach
es in WSNs. It first identifies
some of the problems that confront the key management. Then, it defines some criteria for
viable solutions to key management problems. Next, it explores some of the proposed key
management approaches, and analyzes them according to the presented criteria. Some open
research issues are discussed.