𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Secure Broadcast Communication: In Wired and Wireless Networks

✍ Scribed by Adrian Perrig, J. D. Tygar (auth.)


Publisher
Springer US
Year
2003
Tongue
English
Leaves
221
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:
*key distribution for access control,
*source authentication of transmissions, and
*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.

✦ Table of Contents


Front Matter....Pages i-xix
Introduction....Pages 1-17
Cryptographic Fundamentals....Pages 19-27
TESLA Broadcast Authentication....Pages 29-53
BiBa Broadcast Authentication....Pages 55-83
EMSS, MESS, & HTSS: Signatures for Broadcast....Pages 85-110
ELK Key Distribution....Pages 111-148
Sensor Network Security....Pages 149-173
Related Work....Pages 175-183
Conclusion....Pages 185-188
Glossary....Pages 189-192
Back Matter....Pages 193-212

✦ Subjects


Theory of Computation; Computer Communication Networks; Data Structures, Cryptology and Information Theory; The Computing Profession; Electrical Engineering


πŸ“œ SIMILAR VOLUMES


Security in Wireless Mesh Networks (Wire
✍ Yan Zhang, Jun Zheng, Honglin Hu πŸ“‚ Library πŸ“… 2008 🌐 English

Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, l

Security in RFID and Sensor Networks (Wi
✍ Paris Kitsos πŸ“‚ Library πŸ“… 2009 πŸ› Auerbach Publications 🌐 English

<P>In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing. As

Security in Wireless Communication Netwo
✍ Feng Ye, Hsiao-Hwa Chen, Yi Qian πŸ“‚ Library πŸ“… 2021 πŸ› Wiley-IEEE Press 🌐 English

<p><b>Receive comprehensive instruction on the fundamentals of wireless security from three leading international voices in the fieldΒ </b>Β </p> <p><i>Security in Wireless Communication Networks</i>Β deliversΒ a thorough grounding in wireless communication security. The distinguished authors pay partic