Buch, Englisch, 232 Seiten, Format (B × H): 157 mm x 234 mm, Gewicht: 476 g
Buch, Englisch, 232 Seiten, Format (B × H): 157 mm x 234 mm, Gewicht: 476 g
ISBN: 978-1-4398-6901-7
Verlag: CRC Press
After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN.
Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.
Zielgruppe
Academic and Professional Practice & Development
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Mobilfunk- und Drahtlosnetzwerke & Anwendungen
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik Drahtlostechnologie
Weitere Infos & Material
Introduction to Wireless Sensor Networks. Security in Wireless Sensor Networks. Elliptic Curve Cryptography. Identity-Based Cryptography. Identity-Based Authentication and Encryption in Wireless Sensor Networks. Identity-Based Key Distribution in Wireless Sensor Networks. Routing in Wireless Sensor Networks Using Identity-Based Cryptography. Cross-Layer Security in Wireless Sensor Networks. Implementation of Elliptic Curve Cryptography in Wireless Sensor Networks. Each chapter includes a Summary and References. Appendix—For Further Reading.