<strong>The 7 Qualities of Highly Secure Software</strong>provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games-to illustrate the
Security for Wireless Sensor Networks using Identity-Based Cryptography
β Scribed by Patil, H.K. and Szygenda, S.A.
- Publisher
- Taylor & Francis
- Year
- 2012
- Tongue
- English
- Leaves
- 230
- Edition
- illustrated
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN securityβdetailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.
After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN.
Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.
π SIMILAR VOLUMES
<p><P>Wireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations.</P><P><STRONG>Security for Wireless Sensor Networks</STRONG> discusses fundamental security issues in wireless sensor networks, techniques for the prote
<p><span>Wireless sensor networks (WSNs) have attracted high interest over the last few decades in the wireless and mobile computing research community. Applications of WSNs are numerous and growing, including indoor deployment scenarios in the home and office to outdoor deployment in an adversaryβs
This book discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. It contains example applications for target tracking, scientific exploration and data acquisition i
<p><p>This book describes the use of low-power low-cost and extremely small radios to provide essential time reference for wireless sensor networks. The authors explain how to integrate such radios in a standard CMOS process to reduce both cost and size, while focusing on the challenge of designing
<p><p>This book describes the use of low-power low-cost and extremely small radios to provide essential time reference for wireless sensor networks. The authors explain how to integrate such radios in a standard CMOS process to reduce both cost and size, while focusing on the challenge of designing