After performing the analysis, it is quite clear that most of the algorithm being purposed by researchers for WSN need to be designed keeping in view resources constraints of WSN.
: Security has always been a major area of concern for WSN. Due to limited resources and size constraints of a node, WSN still lacks a comprehensive security mechanism for its operations. In this paper, some of the purposed security methods for WSN are being analyzed for the issues that still exist in the purposed security method. To perform the analysis on security methods some of the documented or implemented security algorithm by researchers are being studied and the issues with those algorithms are being highlighted. After performing the analysis, it is quite clear that most of the algorithm being purposed by researchers for WSN need to be designed keeping in view resources constraints of WSN.