Section II discusses the
various challenges that WSNs face and the different attacks in
WSNs.
Section III deals with security detailing, like
cryptography and key management and challenges faced by
routing protocols.
A couple of secured routing protocols of
WSN are discussed in Section IV.
Section V highlights security
issues related to interoperability in heterogeneous networks and
Section VI concludes the paper.