As wireless detector networks still grow, therefore will the necessity for effective security mechanisms. Because sensor networks might move with sensitive information and/or operate in hostile unattended environments, it is imperative that these security considerations be addressed from the start of the system style. However, thanks to inherent resource and computing constraints, security in detector networks poses totally different challenges than ancient network/ computer security. There’s presently huge analysis potential within the field of wireless detector network security. Thus, familiarity with this analysis during this field can profit researchers greatly. With this in mind, we have a tendency to survey the key topics in wireless detector network ECM and attacks, and gift the obstacles and also the necessities within the detector security, classify many of this attacks and list their corresponding defensive measures/related work, and at last open challenges for the same.