Shivangi Raman et. al. / International Journal of Engineering Science and Technology Vol. 2(5), 2010, 962-969 Wireless sensor networks: A Survey of Intrusions and their Explored Remedies Shivangi Raman 1 , Amar Prakash 2 , Kishore Babu Pulla 2 , Prateek Srivastava 2 Ashish Srivastava 3 , Shveta Singh 3 Indian Institute of Information Technology, Allahabad Abstract – On one hand, where we are seeing and experiencing the dilated technologies, the retrospective of the past is giving the researchers a new area to learn and pioneer new dimensions of the same challenges. Wired sensor networks had been a great source of getting the information about a specific object. But with incremental challenges that were posed to the researchers, wireless sensor networks were developed so that the impugnation that had become drawbacks of the wired network system could be dealt with. The upcoming of the wireless sensor network indeed brought with it many advantageous characteristic features, but there were also some vulnerabilities that crept in along with this great development. This paper shall delineate about the various attacks on wireless sensor networks that depict that they still need to be protected to a great extent, and that there is still much room for development of this novel technology that is experiencing its evolution phase. The paper also tells about the different remedies to the vulnerabilities that have been proposed and would analyze some of the solutions contributed by some of the researchers. Keywords: Wireless Sensor Networks, vulnerabilities, attacks, security. I. INTRODUCTION The contribution of WSN has been noteworthy in the fields of farming, medical, military and even in the field of geographical discoveries and planet study[1][2]. WSN are used to locate not only the objects whose area of location is known, but also the objects whose location is anticipated to be around a certain domain. WSN have many specific implementations. These specific implementations have their specific problems and their respective attacks because of their own vulnerabilities that are their low battery power, their limited capability of processing and storage which consists of their volatile memory and their limited bandwidth[2][3]. So it becomes necessary for the researchers to know the attacks that can take place due to the increasing number of vulnerabilities. It is also interesting to note that despite the number of vulnerabilities, there are a large number of uses of the WSN, for instance in the military and in the security applications that are brought into use locally[2]. So it is necessary to look into those qualities of the WSN that make it peculiar and still interesting for usage by most scientists concerned with security. These qualities include the ability to sense and process physical environment and information in it in crude form[3]. The basic idea of the sensors is not to measure the quality of any data or storage of data but to actually get dispersed in a certain geographical area and perform tasks in case of certain specific objectivities like surveillance or monitoring or collecting information about the radical changes occurring in the environmental conditions[4]. This sensing of data that is to be performed under the conditions of the environment varies according to the field and magnitude of the work to perform which the WSN have been designed. That is to say that to sense changes in the human body the sensors should be of a different sensitivity and hence sensitivity varies for the different types of geographical environments as well. The communications are being performed by the usage of the transceivers and this has attracted many scientists to study about the WSN[4]. Vulnerability removal has become a great concern for the scientists and researchers worldwide and causes research to move ahead in the field of WSN to combat its problems and make it much more useful. We would therefore discuss the attacks that are posed in the WSN and their possible remedies. ISSN: 0975-5462 962