Xiao | Security in Sensor Networks | E-Book | sack.de
E-Book

E-Book, Englisch, 341 Seiten

Xiao Security in Sensor Networks

E-Book, Englisch, 341 Seiten

ISBN: 978-1-4200-1339-9
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.

Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practitioners in the field. Containing thirteen invited chapters from internationally recognized security experts, this volume details attacks, encryption, authentication, watermarking, key management, secure routing, and secure aggregation, location, and cross-layer. It offers insight into attacking and defending routing mechanisms in ad hoc and sensor networks, and analyzes MAC layer attacks in 802.15.4 sensor networks.

About the Author
Before joining the Department of Computer Science at the University of Alabama in 2006, and his prior position at the University of Memphis in 2002, Dr. Yang Xiao was an accomplished Medium Access Control (MAC) architect deeply involved in IEEE 802.11 standard enhancement. A former voting member of IEEE 802.11 Working Group, he serves as editor or on the editorial boards of numerous prestigious journals that cover emerging topics within mobile and wireless computing. A co-editor of seven books, he also serves as a referee/reviewer for many funding agencies, as well as a panelist for the National Science Foundation.
Xiao Security in Sensor Networks jetzt bestellen!

Zielgruppe


Network design and development engineers, researchers, and students working on sensor networks and security.


Autoren/Hrsg.


Weitere Infos & Material


ATTACKS
Attacks and Defenses of Routing Mechanisms in Ad Hoc and Sensor Networks
You-Chiun Wang and Yu-Chee Tseng

MAC Layer Attacks in 802.15.4 Sensor Networks
Vojislav B. Misic, Jun Fung, and Jelena Misic

ENCRYPTION, AUTHENTICATION, AND WATERMARKING

Securing Radio Frequency Identification
Yang Xiao and Swapna Shroff

Watermarking Technique for Sensor Networks: Foundations and Applications
Farinaz Koushanfar and Miodrag Potkonjak

KEY MANAGEMENTS
Group Key Management in Sensor Networks
Sencun Zhu and Wensheng Zhang

Key Management Scheme for Wireless Sensor Networks
Yixin Jiang, Chuang Lin, Minghui Shi, and Xuemin (Sherman) Shen

Key Management for Wireless Sensor Networks in Hostile Environments
Michael Chorzempa, Jung-Min Park, Mohamed Eltoweissy, and Thomas Hou

SECURE ROUTING
Scalable Security in Wireless Sensor and Actuator Networks (WSANs)
Fei Hu, Waqaas Siddiqui, and Krishna Sankar

Security Issues in Ad Hoc Networks
Ming Chuen (Derek) Wong, Yang Xiao, and Xu (Kevin) Su

Security in Wireless Sensor Networks: A Survey
Wei Zhang, Sajal K. Das, and Yonghe Liu

SECURE AGGREGATION, LOCATION, AND CROSS-LAYER
Secure In-Network Processing in Sensor Networks
Tassos Dimitriou and Ioannis Krontiris

Secure Localization in Sensor Networks
Karthikeyan Ravichandran, and Krishna M Sivalingam

Cross-Layer Design for the Security of Wireless Sensor
Networks
Mingbo Xiao, Xudong Wang, and Guangsong Yang


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.