Security Attacks – Key Distribution and Management – Intrusion Detection – Software based Anti- tamper techniques – Water marking techniques – Defense against routing attacks – Secure Ad hoc routing protocols – Broadcast authentication WSN protocols – TESLA – Biba – Sensor Network Security Protocols – SPINS