<p><span>Wireless sensor networks (WSNs) have attracted high interest over the last few decades in the wireless and mobile computing research community. Applications of WSNs are numerous and growing, including indoor deployment scenarios in the home and office to outdoor deployment in an adversaryβs
Security for Wireless Sensor Networks
β Scribed by Donggang Liu, Peng Ning (auth.)
- Publisher
- Springer US
- Year
- 2007
- Tongue
- English
- Leaves
- 213
- Series
- Advances in Information Security 28
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Wireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations.
Security for Wireless Sensor Networks discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. This volume assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain.
Security for Wireless Sensor Networksis designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science.
β¦ Table of Contents
Front Matter....Pages I-XI
Introduction....Pages 1-7
Broadcast Authentication....Pages 9-57
Pairwise Key Establishment....Pages 59-97
Improving Pairwise Key Establishment Using Deployment Knowledge....Pages 99-148
Secure Localization....Pages 149-195
Summary and Future Work....Pages 197-199
Back Matter....Pages 201-209
β¦ Subjects
Computer Communication Networks; Data Encryption; Data Structures, Cryptology and Information Theory; Computer Systems Organization and Communication Networks; Coding and Information Theory
π SIMILAR VOLUMES
This book discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. It contains example applications for target tracking, scientific exploration and data acquisition i
<p>This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts a
<p>Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN securityβdetailing its pros and cons. Next, it examines new attack vect
<strong>The 7 Qualities of Highly Secure Software</strong>provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games-to illustrate the
<p><p>This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions