語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security and privacy in smart sensor...
~
Maleh, Yassine, (1987-)
Security and privacy in smart sensor networks
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Security and privacy in smart sensor networks/ Yassine Maleh, Abdellah Ezzati, and Mustapha Belaissaoui, editors.
其他作者:
Maleh, Yassine,
出版者:
Hershey, Pennsylvania :IGI Global, : [2019],
面頁冊數:
1 online resource (xxii, 441 p.)
標題:
Sensor networks - Security measures. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5736-4
ISBN:
9781522557371 (ebook)
Security and privacy in smart sensor networks
Security and privacy in smart sensor networks
[electronic resource] /Yassine Maleh, Abdellah Ezzati, and Mustapha Belaissaoui, editors. - Hershey, Pennsylvania :IGI Global,[2019] - 1 online resource (xxii, 441 p.)
Includes bibliographical references and index.
Section 1. Smart sensor protocols and cryptographic algorithms. Chapter 1. Key management protocols for smart sensor networks ; Chapter 2. Secure and energy-efficient routing for cluster-based wireless sensor networks ; Chapter 3. Trust management in vehicular Ad hoc network ; Chapter 4. An optimized reputation-based trust management scheme for MANET security ; Chapter 5. Trust management issues for sensors security and privacy in the smart grid -- Section 2. Security and privacy in the internet of things (IoT). Chapter 6. Security in the internet of things ; Chapter 7. Trust management in the internet of things ; Chapter 8. Security threats in the internet of things: RPL's attacks and countermeasures ; Chapter 9. IoT security based on content-centric networking architecture -- Section 3. Smart networks: access control and intrusion detection systems. Chapter 10. Network access control and collaborative security against APT and AET ; Chapter 11. A novel real-time lighting-invariant lane departure warning system ; Chapter 12. A review of intrusion detection systems in cloud computing ; Chapter 13. A secure routing scheme against malicious nodes in Ad hoc networks -- Section 4. Smart networks: security management and methods. Chapter 14. A state-of-the-art assessment of US and EU c-ITS security solutions ; Chapter 15. Security in 4G: IP multimedia subsystem (IMS) use case ; Chapter 16. Security of information exchange between readers and tags.
Restricted to subscribers or individual electronic text purchasers.
"This book explores current research on how to implement smart sensor networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, lightweight crypto and security solutions, authentication and intrusion detection"--
ISBN: 9781522557371 (ebook)Subjects--Topical Terms:
643995
Sensor networks
--Security measures.
LC Class. No.: TK7872.D48 / S425 2019e
Dewey Class. No.: 006.2/5
Security and privacy in smart sensor networks
LDR
:02746nam a2200277 a 4500
001
893647
003
IGIG
005
20181030160856.0
006
m o d
007
cr cn
008
181113s2019 pau fob 001 0 eng d
010
$z
2017055702
020
$a
9781522557371 (ebook)
020
$a
9781522557364 (hardcover)
035
$a
(OCoLC)1031311883
035
$a
1071025334
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
TK7872.D48
$b
S425 2019e
082
0 4
$a
006.2/5
$2
23
245
0 0
$a
Security and privacy in smart sensor networks
$h
[electronic resource] /
$c
Yassine Maleh, Abdellah Ezzati, and Mustapha Belaissaoui, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2019]
300
$a
1 online resource (xxii, 441 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Section 1. Smart sensor protocols and cryptographic algorithms. Chapter 1. Key management protocols for smart sensor networks ; Chapter 2. Secure and energy-efficient routing for cluster-based wireless sensor networks ; Chapter 3. Trust management in vehicular Ad hoc network ; Chapter 4. An optimized reputation-based trust management scheme for MANET security ; Chapter 5. Trust management issues for sensors security and privacy in the smart grid -- Section 2. Security and privacy in the internet of things (IoT). Chapter 6. Security in the internet of things ; Chapter 7. Trust management in the internet of things ; Chapter 8. Security threats in the internet of things: RPL's attacks and countermeasures ; Chapter 9. IoT security based on content-centric networking architecture -- Section 3. Smart networks: access control and intrusion detection systems. Chapter 10. Network access control and collaborative security against APT and AET ; Chapter 11. A novel real-time lighting-invariant lane departure warning system ; Chapter 12. A review of intrusion detection systems in cloud computing ; Chapter 13. A secure routing scheme against malicious nodes in Ad hoc networks -- Section 4. Smart networks: security management and methods. Chapter 14. A state-of-the-art assessment of US and EU c-ITS security solutions ; Chapter 15. Security in 4G: IP multimedia subsystem (IMS) use case ; Chapter 16. Security of information exchange between readers and tags.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book explores current research on how to implement smart sensor networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, lightweight crypto and security solutions, authentication and intrusion detection"--
$c
Provided by publisher.
650
0
$a
Sensor networks
$x
Security measures.
$3
643995
700
1
$a
Maleh, Yassine,
$d
1987-
$e
editor.
$3
1155964
700
1
$a
Ezzati, Abdellah,
$d
1966-
$e
editor.
$3
1155965
700
1
$a
Belaissaoui, Mustapha,
$d
1968-
$e
editor.
$3
1155966
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5736-4
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入