Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    [Place of publication not identified] :CRC Press,
    UID:
    almahu_9949385293102882
    Format: 1 online resource (248 pages)
    Edition: First edition.
    ISBN: 9781003257608 , 1003257607 , 9781000544763 , 1000544761 , 9781000544800 , 100054480X
    Content: Wireless sensor networks have attracted high interest over last few decades in the wireless and mobile computing research community. Applications of wireless sensor networks are numerous and growing, including indoor deployment scenarios in the home and office to outdoor deployment in adversary⁰́₉s territory in a tactical background. However, due to distributed nature and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their performance. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanism with Lange overhead of computation and communication is infusible in wireless sensor network. Design and implementation of secure wireless sensor networks is, therefore a particular challenging task. This book covers a comprehensive discussion on the state of the art in security technologies for wireless sensor networks. It identifies various possible attacks at different layers of the communication protocol stack in a typical wireless sensor network and presents their possible countermeasures. A brief discussion on the future direction of research in wireless sensor network security is also included.
    Note: 1. Introduction to Wireless Sensor Network2. Security in Wireless Sensor Networks ⁰́₃ Background3. QoS as Means of Providing WSN Security4. The Security Framework for Wireless Sensor Network5. Secure Key Management Scheme (SKMS)6. Secure Routing Algorithms (SRAs) in Sensor Networks7. Secure Localization Technique (SLT)8. Malicious Node Detection Mechanism9. The Distributed Signature Scheme (DSS) Based on RSA
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages