𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Security for Wireless Sensor Networks using Identity-Based Cryptography

✍ Scribed by Patil, H.K. and Szygenda, S.A.


Publisher
Taylor & Francis
Year
2012
Tongue
English
Leaves
230
Edition
illustrated
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN securityβ€”detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.

After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN.

Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.


πŸ“œ SIMILAR VOLUMES


Security for wireless sensor networks us
✍ Patil, Kupwade Harsh;, Szygenda A(Stephen) πŸ“‚ Library πŸ“… 2013;2016 πŸ› CRC Press 🌐 English

<strong>The 7 Qualities of Highly Secure Software</strong>provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games-to illustrate the

Security for Wireless Sensor Networks
✍ Donggang Liu, Peng Ning (auth.) πŸ“‚ Library πŸ“… 2007 πŸ› Springer US 🌐 English

<p><P>Wireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations.</P><P><STRONG>Security for Wireless Sensor Networks</STRONG> discusses fundamental security issues in wireless sensor networks, techniques for the prote

Security Issues for Wireless Sensor Netw
✍ Parag Verma, Ankur Dumka, Anuj Bhardwaj, Navneet Kaur πŸ“‚ Library πŸ“… 2022 πŸ› CRC Press 🌐 English

<p><span>Wireless sensor networks (WSNs) have attracted high interest over the last few decades in the wireless and mobile computing research community. Applications of WSNs are numerous and growing, including indoor deployment scenarios in the home and office to outdoor deployment in an adversary’s

Security for Wireless Sensor Networks (A
✍ Donggang Liu, Peng Ning πŸ“‚ Library πŸ“… 2006 πŸ› Springer 🌐 English

This book discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. It contains example applications for target tracking, scientific exploration and data acquisition i

Mobility-based Time References for Wirel
✍ Fabio Sebastiano, Lucien J. Breems, Kofi A. A. Makinwa (auth.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag New York 🌐 English

<p><p>This book describes the use of low-power low-cost and extremely small radios to provide essential time reference for wireless sensor networks. The authors explain how to integrate such radios in a standard CMOS process to reduce both cost and size, while focusing on the challenge of designing

Mobility-based Time References for Wirel
✍ Fabio Sebastiano, Lucien J. Breems, Kofi A. A. Makinwa (auth.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag New York 🌐 English

<p><p>This book describes the use of low-power low-cost and extremely small radios to provide essential time reference for wireless sensor networks. The authors explain how to integrate such radios in a standard CMOS process to reduce both cost and size, while focusing on the challenge of designing