Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Secure Wireless Sensor Networks = Th...
~
SpringerLink (Online service)
Secure Wireless Sensor Networks = Threats and Solutions /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Secure Wireless Sensor Networks/ by Mauro Conti.
Reminder of title:
Threats and Solutions /
Author:
Conti, Mauro.
Description:
XIII, 169 p.online resource. :
Contained By:
Springer Nature eBook
Subject:
Computer communication systems. -
Online resource:
https://doi.org/10.1007/978-1-4939-3460-7
ISBN:
9781493934607
Secure Wireless Sensor Networks = Threats and Solutions /
Conti, Mauro.
Secure Wireless Sensor Networks
Threats and Solutions /[electronic resource] :by Mauro Conti. - 1st ed. 2015. - XIII, 169 p.online resource. - Advances in Information Security,651568-2633 ;. - Advances in Information Security,.
Introduction -- Pair-wise key establishment -- Capture Detection -- Clone Detection -- Secure Data Aggregation -- Privacy in Data Aggregation -- Conclusions and Future Works.
This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone attack. It examines a number of areas and problems to which WSNs are applied continuously, including: supporting rescue operations, building surveillance, fire prevention, battlefield monitoring and more. However, known and unknown threats still affect WSNs and in many applications of this new technology the security of the network is a fundamental issue for confidentiality, integrity, authenticity and availability. The last section of the book addresses security for a common WSN service. Case studies are provided throughout. Secure Wireless Sensor Networks: Threats and Solutions targets advanced-level students and researchers in computer science and electrical engineering as a secondary text book. Professionals working in the wireless sensor networks field will also find this book useful as a reference. .
ISBN: 9781493934607
Standard No.: 10.1007/978-1-4939-3460-7doiSubjects--Topical Terms:
1115394
Computer communication systems.
LC Class. No.: TK5105.5-5105.9
Dewey Class. No.: 004.6
Secure Wireless Sensor Networks = Threats and Solutions /
LDR
:02705nam a22004095i 4500
001
962481
003
DE-He213
005
20200630145014.0
007
cr nn 008mamaa
008
201211s2015 xxu| s |||| 0|eng d
020
$a
9781493934607
$9
978-1-4939-3460-7
024
7
$a
10.1007/978-1-4939-3460-7
$2
doi
035
$a
978-1-4939-3460-7
050
4
$a
TK5105.5-5105.9
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
004.6
$2
23
100
1
$a
Conti, Mauro.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1067786
245
1 0
$a
Secure Wireless Sensor Networks
$h
[electronic resource] :
$b
Threats and Solutions /
$c
by Mauro Conti.
250
$a
1st ed. 2015.
264
1
$a
New York, NY :
$b
Springer New York :
$b
Imprint: Springer,
$c
2015.
300
$a
XIII, 169 p.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Advances in Information Security,
$x
1568-2633 ;
$v
65
505
0
$a
Introduction -- Pair-wise key establishment -- Capture Detection -- Clone Detection -- Secure Data Aggregation -- Privacy in Data Aggregation -- Conclusions and Future Works.
520
$a
This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone attack. It examines a number of areas and problems to which WSNs are applied continuously, including: supporting rescue operations, building surveillance, fire prevention, battlefield monitoring and more. However, known and unknown threats still affect WSNs and in many applications of this new technology the security of the network is a fundamental issue for confidentiality, integrity, authenticity and availability. The last section of the book addresses security for a common WSN service. Case studies are provided throughout. Secure Wireless Sensor Networks: Threats and Solutions targets advanced-level students and researchers in computer science and electrical engineering as a secondary text book. Professionals working in the wireless sensor networks field will also find this book useful as a reference. .
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Computer security.
$3
557122
650
0
$a
Electrical engineering.
$3
596380
650
0
$a
Data encryption (Computer science).
$3
1051084
650
1 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Communications Engineering, Networks.
$3
669809
650
2 4
$a
Cryptology.
$3
1211076
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781493934584
776
0 8
$i
Printed edition:
$z
9781493934591
776
0 8
$i
Printed edition:
$z
9781493947515
830
0
$a
Advances in Information Security,
$x
1568-2633
$3
1256774
856
4 0
$u
https://doi.org/10.1007/978-1-4939-3460-7
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login