Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
Person/Organisation
  • 1
    Online Resource
    Online Resource
    Hoboken, N.J. :Wiley ;
    UID:
    almafu_9959327350902883
    Format: 1 online resource (288)
    ISBN: 9780470516782 , 047051678X
    Content: This book provides an in-depth guide to security in wireless ad hoc and sensor networks Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and counter measures in wireless ad hoc, sensor and mesh networks, and briefly presents the standards on related topics. The authors offer a clear exposition of various challenges and solutions in this field including bootstrapping, key distribution and exchange, authentication issues, privacy, anonymity and tamper resilience. Key Features: *Introduces the fundamentals and key issues of the new technologies followed by comprehensive presentation on security attacks and counter measures *Covers Denial of Service (DoS) attacks, hardware aspects of secure wireless ad hoc and sensor networks and secure routing *Contains information on cryptographic primitives and electronic warfare *Includes problems at the end of each chapter to enhance learning. This book is an invaluable resource for graduate students studying computer, electrical and communications engineering, researchers in academia and industry, and C4I engineers and officers in the military. Wireless network designers for internet service providers and mobile communications operators will also find this book very useful.
    Note: Cover -- Title Page -- Copyright Page -- Table of Contents -- About the Authors -- Preface -- Acknowledgements -- List of Acronyms -- Part One Wireless Ad Hoc, Sensor and Mesh Networking -- 1 Introduction -- 1.1 Information Security -- 1.1.1 Computer Security -- 1.1.2 Communications Security -- 1.2 Scope of the Book -- 1.3 Structure of the Book -- 1.4 Electronic Resources for the Book -- 1.5 Review Questions -- 2 Wireless Ad Hoc, Sensor and Mesh Networks -- 2.1 Ad Hoc Networks and Applications -- 2.1.1 Application Examples -- 2.1.2 Challenges -- 2.2 Sensor and Actuator Networks -- 2.2.1 Application Examples -- 2.2.2 Challenges -- 2.3 Mesh Networks -- 2.3.1 Application Examples -- 2.3.2 Challenges -- 2.4 Tactical Communications and Networks -- 2.4.1 Blue Force Tracking System -- 2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks -- 2.5.1 Wireless Medium -- 2.5.2 Networking Regime -- 2.5.3 Nature of Traffic -- 2.5.4 Quality of Service Requirements -- 2.5.5 Mobility -- 2.5.6 Fault Tolerance -- 2.5.7 Operating Environment -- 2.5.8 Power Efficiency Requirements -- 2.5.9 Scalability -- 2.5.10 Hardware Requirements and Production Cost -- 2.6 Review Questions -- 3 The Wireless Medium -- 3.1 Wireless Channel Fundamentals and Security -- 3.1.1 Capacity -- 3.1.2 Electromagnetic Spectrum -- 3.1.3 Path Loss and Attenuation -- 3.1.4 Other Transmission Impairments and Jamming -- 3.1.5 Modulation and Demodulation -- 3.1.6 Manchester Encoding -- 3.1.7 Multiplexing and Duplexing -- 3.2 Advanced Radio Technologies -- 3.2.1 Directional and Smart Antennas -- 3.2.2 Software Radios -- 3.2.3 Cognitive Radios -- 3.2.4 Multiradio/Multichannel Systems -- 3.2.5 MIMO Systems -- 3.3 Review Questions -- 4 Medium Access and Error Control -- 4.1 Medium Access Control -- 4.1.1 Generic MAC Protocols -- 4.1.2 MAC Protocols for Wireless Ad Hoc, Sensor and Mesh Networks -- 4.2 Error Control -- 4.2.1 Error Correction -- 4.2.2 Error Detection -- 4.3 Wireless Metropolitan Area Networks -- 4.3.1 IEEE 802.16 -- 4.3.2 WiMAX -- 4.4 Wireless Local Area Networks -- 4.4.1 IEEE 802.11 -- 4.4.2 Wi-Fi -- 4.5 Wireless Personal Area Networks -- 4.5.1 IEEE 802.15.1 -- 4.5.2 Bluetooth -- 4.5.3 IEEE 802.15.4 -- 4.5.4 ZigBee -- 4.5.5 WiMedia -- 4.6 Review Questions -- 5 Routing -- 5.1 Internet Protocol and Mobile IP -- 5.1.1 IPv4, IPv6 and Security in IP -- 5.1.2 Distance Vector and Link State Algorithms -- 5.1.3 Internetworking -- 5.1.4 Multicasting, Geocasting, Anycasting and Broadcasting -- 5.1.5 Mobile IP -- 5.2 Routing in Wireless Ad Hoc Networks -- 5.2.1 Flooding and Gossiping -- 5.2.2 Ad Hoc On-demand Distance Vector Routing (AODV) -- 5.2.3 Dynamic Source Routing -- 5.3 Routing in Wireless Sensor and Actuator Networks -- 5.3.1 Directed Diffusion -- 5.3.2 Sensor Protocols for Information via Negotiation (SPIN) -- 5.3.3 Low-Energy Adaptive Clustering Hierarchy (LEACH) -- 5.3.4 Power-Aware Many-to-Many Routing (PAMR) -- 5.4 Review Questions -- 6 Reliability, Flow and Congestion Control -- 6.1 Reliability -- 6.1.1 Non-Acknowledgement-Based Schemes -- 6.1.2 Acknowledgement-Based Schemes -- 6.2 Flow and Congestion Control -- 6.3 Review Questions -- 7 Other.
    Additional Edition: Print version: Çayirci, E. (Erdal). Security in wireless ad hoc and sensor networks. Hoboken, N.J. : Wiley ; Chichester : John Wiley [distributor], 2008 ISBN 9780470027486
    Additional Edition: ISBN 0470027487
    Language: English
    Keywords: Electronic books. ; Electronic resource. ; Electronic books. ; Electronic resource.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Hoboken, N.J. :Wiley ;
    UID:
    edocfu_9959327350902883
    Format: 1 online resource (288)
    ISBN: 9780470516782 , 047051678X
    Content: This book provides an in-depth guide to security in wireless ad hoc and sensor networks Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and counter measures in wireless ad hoc, sensor and mesh networks, and briefly presents the standards on related topics. The authors offer a clear exposition of various challenges and solutions in this field including bootstrapping, key distribution and exchange, authentication issues, privacy, anonymity and tamper resilience. Key Features: *Introduces the fundamentals and key issues of the new technologies followed by comprehensive presentation on security attacks and counter measures *Covers Denial of Service (DoS) attacks, hardware aspects of secure wireless ad hoc and sensor networks and secure routing *Contains information on cryptographic primitives and electronic warfare *Includes problems at the end of each chapter to enhance learning. This book is an invaluable resource for graduate students studying computer, electrical and communications engineering, researchers in academia and industry, and C4I engineers and officers in the military. Wireless network designers for internet service providers and mobile communications operators will also find this book very useful.
    Note: Cover -- Title Page -- Copyright Page -- Table of Contents -- About the Authors -- Preface -- Acknowledgements -- List of Acronyms -- Part One Wireless Ad Hoc, Sensor and Mesh Networking -- 1 Introduction -- 1.1 Information Security -- 1.1.1 Computer Security -- 1.1.2 Communications Security -- 1.2 Scope of the Book -- 1.3 Structure of the Book -- 1.4 Electronic Resources for the Book -- 1.5 Review Questions -- 2 Wireless Ad Hoc, Sensor and Mesh Networks -- 2.1 Ad Hoc Networks and Applications -- 2.1.1 Application Examples -- 2.1.2 Challenges -- 2.2 Sensor and Actuator Networks -- 2.2.1 Application Examples -- 2.2.2 Challenges -- 2.3 Mesh Networks -- 2.3.1 Application Examples -- 2.3.2 Challenges -- 2.4 Tactical Communications and Networks -- 2.4.1 Blue Force Tracking System -- 2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks -- 2.5.1 Wireless Medium -- 2.5.2 Networking Regime -- 2.5.3 Nature of Traffic -- 2.5.4 Quality of Service Requirements -- 2.5.5 Mobility -- 2.5.6 Fault Tolerance -- 2.5.7 Operating Environment -- 2.5.8 Power Efficiency Requirements -- 2.5.9 Scalability -- 2.5.10 Hardware Requirements and Production Cost -- 2.6 Review Questions -- 3 The Wireless Medium -- 3.1 Wireless Channel Fundamentals and Security -- 3.1.1 Capacity -- 3.1.2 Electromagnetic Spectrum -- 3.1.3 Path Loss and Attenuation -- 3.1.4 Other Transmission Impairments and Jamming -- 3.1.5 Modulation and Demodulation -- 3.1.6 Manchester Encoding -- 3.1.7 Multiplexing and Duplexing -- 3.2 Advanced Radio Technologies -- 3.2.1 Directional and Smart Antennas -- 3.2.2 Software Radios -- 3.2.3 Cognitive Radios -- 3.2.4 Multiradio/Multichannel Systems -- 3.2.5 MIMO Systems -- 3.3 Review Questions -- 4 Medium Access and Error Control -- 4.1 Medium Access Control -- 4.1.1 Generic MAC Protocols -- 4.1.2 MAC Protocols for Wireless Ad Hoc, Sensor and Mesh Networks -- 4.2 Error Control -- 4.2.1 Error Correction -- 4.2.2 Error Detection -- 4.3 Wireless Metropolitan Area Networks -- 4.3.1 IEEE 802.16 -- 4.3.2 WiMAX -- 4.4 Wireless Local Area Networks -- 4.4.1 IEEE 802.11 -- 4.4.2 Wi-Fi -- 4.5 Wireless Personal Area Networks -- 4.5.1 IEEE 802.15.1 -- 4.5.2 Bluetooth -- 4.5.3 IEEE 802.15.4 -- 4.5.4 ZigBee -- 4.5.5 WiMedia -- 4.6 Review Questions -- 5 Routing -- 5.1 Internet Protocol and Mobile IP -- 5.1.1 IPv4, IPv6 and Security in IP -- 5.1.2 Distance Vector and Link State Algorithms -- 5.1.3 Internetworking -- 5.1.4 Multicasting, Geocasting, Anycasting and Broadcasting -- 5.1.5 Mobile IP -- 5.2 Routing in Wireless Ad Hoc Networks -- 5.2.1 Flooding and Gossiping -- 5.2.2 Ad Hoc On-demand Distance Vector Routing (AODV) -- 5.2.3 Dynamic Source Routing -- 5.3 Routing in Wireless Sensor and Actuator Networks -- 5.3.1 Directed Diffusion -- 5.3.2 Sensor Protocols for Information via Negotiation (SPIN) -- 5.3.3 Low-Energy Adaptive Clustering Hierarchy (LEACH) -- 5.3.4 Power-Aware Many-to-Many Routing (PAMR) -- 5.4 Review Questions -- 6 Reliability, Flow and Congestion Control -- 6.1 Reliability -- 6.1.1 Non-Acknowledgement-Based Schemes -- 6.1.2 Acknowledgement-Based Schemes -- 6.2 Flow and Congestion Control -- 6.3 Review Questions -- 7 Other.
    Additional Edition: Print version: Çayirci, E. (Erdal). Security in wireless ad hoc and sensor networks. Hoboken, N.J. : Wiley ; Chichester : John Wiley [distributor], 2008 ISBN 9780470027486
    Additional Edition: ISBN 0470027487
    Language: English
    Keywords: Electronic books. ; Electronic resource.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Hoboken, N.J. :Wiley ;
    UID:
    almahu_9948197272402882
    Format: 1 online resource (288)
    ISBN: 9780470516782 , 047051678X
    Content: This book provides an in-depth guide to security in wireless ad hoc and sensor networks Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and counter measures in wireless ad hoc, sensor and mesh networks, and briefly presents the standards on related topics. The authors offer a clear exposition of various challenges and solutions in this field including bootstrapping, key distribution and exchange, authentication issues, privacy, anonymity and tamper resilience. Key Features: *Introduces the fundamentals and key issues of the new technologies followed by comprehensive presentation on security attacks and counter measures *Covers Denial of Service (DoS) attacks, hardware aspects of secure wireless ad hoc and sensor networks and secure routing *Contains information on cryptographic primitives and electronic warfare *Includes problems at the end of each chapter to enhance learning. This book is an invaluable resource for graduate students studying computer, electrical and communications engineering, researchers in academia and industry, and C4I engineers and officers in the military. Wireless network designers for internet service providers and mobile communications operators will also find this book very useful.
    Note: Cover -- Title Page -- Copyright Page -- Table of Contents -- About the Authors -- Preface -- Acknowledgements -- List of Acronyms -- Part One Wireless Ad Hoc, Sensor and Mesh Networking -- 1 Introduction -- 1.1 Information Security -- 1.1.1 Computer Security -- 1.1.2 Communications Security -- 1.2 Scope of the Book -- 1.3 Structure of the Book -- 1.4 Electronic Resources for the Book -- 1.5 Review Questions -- 2 Wireless Ad Hoc, Sensor and Mesh Networks -- 2.1 Ad Hoc Networks and Applications -- 2.1.1 Application Examples -- 2.1.2 Challenges -- 2.2 Sensor and Actuator Networks -- 2.2.1 Application Examples -- 2.2.2 Challenges -- 2.3 Mesh Networks -- 2.3.1 Application Examples -- 2.3.2 Challenges -- 2.4 Tactical Communications and Networks -- 2.4.1 Blue Force Tracking System -- 2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks -- 2.5.1 Wireless Medium -- 2.5.2 Networking Regime -- 2.5.3 Nature of Traffic -- 2.5.4 Quality of Service Requirements -- 2.5.5 Mobility -- 2.5.6 Fault Tolerance -- 2.5.7 Operating Environment -- 2.5.8 Power Efficiency Requirements -- 2.5.9 Scalability -- 2.5.10 Hardware Requirements and Production Cost -- 2.6 Review Questions -- 3 The Wireless Medium -- 3.1 Wireless Channel Fundamentals and Security -- 3.1.1 Capacity -- 3.1.2 Electromagnetic Spectrum -- 3.1.3 Path Loss and Attenuation -- 3.1.4 Other Transmission Impairments and Jamming -- 3.1.5 Modulation and Demodulation -- 3.1.6 Manchester Encoding -- 3.1.7 Multiplexing and Duplexing -- 3.2 Advanced Radio Technologies -- 3.2.1 Directional and Smart Antennas -- 3.2.2 Software Radios -- 3.2.3 Cognitive Radios -- 3.2.4 Multiradio/Multichannel Systems -- 3.2.5 MIMO Systems -- 3.3 Review Questions -- 4 Medium Access and Error Control -- 4.1 Medium Access Control -- 4.1.1 Generic MAC Protocols -- 4.1.2 MAC Protocols for Wireless Ad Hoc, Sensor and Mesh Networks -- 4.2 Error Control -- 4.2.1 Error Correction -- 4.2.2 Error Detection -- 4.3 Wireless Metropolitan Area Networks -- 4.3.1 IEEE 802.16 -- 4.3.2 WiMAX -- 4.4 Wireless Local Area Networks -- 4.4.1 IEEE 802.11 -- 4.4.2 Wi-Fi -- 4.5 Wireless Personal Area Networks -- 4.5.1 IEEE 802.15.1 -- 4.5.2 Bluetooth -- 4.5.3 IEEE 802.15.4 -- 4.5.4 ZigBee -- 4.5.5 WiMedia -- 4.6 Review Questions -- 5 Routing -- 5.1 Internet Protocol and Mobile IP -- 5.1.1 IPv4, IPv6 and Security in IP -- 5.1.2 Distance Vector and Link State Algorithms -- 5.1.3 Internetworking -- 5.1.4 Multicasting, Geocasting, Anycasting and Broadcasting -- 5.1.5 Mobile IP -- 5.2 Routing in Wireless Ad Hoc Networks -- 5.2.1 Flooding and Gossiping -- 5.2.2 Ad Hoc On-demand Distance Vector Routing (AODV) -- 5.2.3 Dynamic Source Routing -- 5.3 Routing in Wireless Sensor and Actuator Networks -- 5.3.1 Directed Diffusion -- 5.3.2 Sensor Protocols for Information via Negotiation (SPIN) -- 5.3.3 Low-Energy Adaptive Clustering Hierarchy (LEACH) -- 5.3.4 Power-Aware Many-to-Many Routing (PAMR) -- 5.4 Review Questions -- 6 Reliability, Flow and Congestion Control -- 6.1 Reliability -- 6.1.1 Non-Acknowledgement-Based Schemes -- 6.1.2 Acknowledgement-Based Schemes -- 6.2 Flow and Congestion Control -- 6.3 Review Questions -- 7 Other.
    Additional Edition: Print version: Çayirci, E. (Erdal). Security in wireless ad hoc and sensor networks. Hoboken, N.J. : Wiley ; Chichester : John Wiley [distributor], 2008 ISBN 9780470027486
    Additional Edition: ISBN 0470027487
    Language: English
    Keywords: Electronic books. ; Electronic resource.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9780470561782?
Did you mean 9780470510728?
Did you mean 9780470316702?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages