Security in Sensor Networks
CRC Press, Apr 19, 2016 - Computers - 341 pages
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.
Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practition
What people are saying - Write a review
We haven't found any reviews in the usual places.
Chapter 2 MAC Layer Attacks in 802154 Sensor Networks
ENCRYPTION AUTHENTICATION AND WATERMARKING
Chapter 3 Securing Radio Frequency Identificaction
Foundations and Applications
Chapter 5 Group Key Management in Sensor Networks
Chapter 6 Key Management Schemes for Wireless Sensor Networks
Chapter 8 Scalable Security in Wireless Sensor and Actuator Networks WSANs
Chapter 9 Security Issues in Ad Hoc Networks
SECURE AGGREGATION LOCATION AND CROSSLAYER
Chapter 11 Secure InNetwork Processing in Sensor Networks
Chapter 12 Secure Localization in Sensor Networks
Chapter 13 CrossLayer Design for the Security of Wireless Sensor Networks
actuator ad hoc networks administrative keys adversary aggregator algorithm applications architecture attacker nodes backoff base station beacon cluster communication overhead compromised nodes Conference constraints coordinate cryptography deployed deployment distance efficient encryption energy group key group rekeying Hoc and Sensor hoc networks IEEE INFOCOM intrusion detection key chain key distribution key establishment key management key management scheme key pool key server key shared malicious node mobile ad hoc Mobile Computing multiple node capture pair-wise key Perrig polynomial Proc proposed public key R-KPS random key reader received rekeying remote sink resilience RFID robust routing information routing protocols RREQ packets scalability SECK Section secure routing security protocol security scheme sends sensor nodes Serloc session key signature solution subset Sybil attack techniques topology transmission transmitted verify vulnerable watermarking Wireless Networks wireless sensor networks wormhole wormhole attack WSAN WSNs
Page ii - A Practical Guide to Content Delivery Networks Gilbert Held ISBN: 0-8493-3649-X Resource, Mobility and Security Management in Wireless Networks and Mobile Communications Van Zhang, Honglin Hu, and Masayuki Fujise ISBN: 0-8493-8036-7...