JWSN 2013, 1, 1-0002; doi:01.0001/jwsn20010002 Journal of Wireless Sensor Networks ISSN: 2001-6417 www.wsn-journal.com Smart Security Implementation for Wireless Sensor Network Nodes Celestine Iwendi 1 , Alastair Allen 1 and Kennedy Offor 2,* 1. Communications & Optical Engineering Research Group, University of Aberdeen, Fraser Noble. Building, AB24 3UE Aberdeen, Scotland; E-Mail: ciwendi@abdn.ac.uk and a.allen@abdn.ac.uk 2. Department of Electrical/Electronic Engineering, Anambra State University, Nigeria E–mail ken.offor@ansu.edu.ng * Author to whom correspondence should be addressed; E-Mail: ken.offor@ansu.edu.ng Tel.: +2347088997382. Received: 15 June 2013 / Accepted: 03 July 2013 / Published: 08 July 2013 Abstract In the territory of concurrent systems such as wireless sensor networks (WSN), the computational nodes being used in wireless sensor networks faces challenges with security applications. Many different security protocols have been proposed that allow some form of security enhancement but not implemented. This article investigates and implements a number of smart security techniques appropriate for WSN nodes with various trade-off such as power consumption and scalability. We provide a brief survey of the major approaches to security prerogative and methods that could reduce if not eliminate algorithmic complexity and denial of service attacks to sensor nodes. Keywords Blom; AES; Pairwise key; WSN; preallocation; pre-distribution; Contiki; Cooja; uIP; smart performance 1.0 Introduction Concurrent systems such as Wireless Sensor Networks (WSN) are becoming very useful in various day-to-day communication systems [1]. However, with the surge in the usage; WSN are still hampered by limited communication range, low memory capacity and limited energy. These constraints create a very big challenge for current security relevance.