Buch, Englisch, 212 Seiten, Format (B × H): 165 mm x 233 mm, Gewicht: 1090 g
Buch, Englisch, 212 Seiten, Format (B × H): 165 mm x 233 mm, Gewicht: 1090 g
Reihe: Advances in Information Security
ISBN: 978-0-387-32723-5
Verlag: Springer Us
Wireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations. This book discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. It includes a fairly new study on capabilities of mu-TESLA, a broadcast authentication technique for wireless sensor networks. This volume assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain. The book is designed for a professional audience composed of researchers and practitioners in industry. It is also suitable as a secondary text for graduate-level students in computer science.
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik Drahtlostechnologie
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Informatik Logik, formale Sprachen, Automaten
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
Weitere Infos & Material
Broadcast Authentication.- Pairwise Key Establishment.- Improving Pairwise Key Establishment Using Deployment Knowledge.- Secure Localization.- Summary and Future Work.