Security for Wireless Sensor Networks
Donggang Liu
Vendu par AHA-BUCH GmbH, Einbeck, Allemagne
Vendeur AbeBooks depuis 14 août 2006
Neuf(s) - Couverture rigide
Etat : Neu
Quantité disponible : 2 disponible(s)
Ajouter au panierVendu par AHA-BUCH GmbH, Einbeck, Allemagne
Vendeur AbeBooks depuis 14 août 2006
Etat : Neu
Quantité disponible : 2 disponible(s)
Ajouter au panierNeuware - The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monitor and report the conditions and events in their local environments. A large collection of these sensor nodes can thus form a wireless sensor network in an ad hoc manner, creating a new type of information systems. Such sensor networks have recently emerged as an important means to study and interact with the physical world and have received a lot of attention due to their wide applications in military and civilian operations such as target tracking and data acquisition. However, in many of these applications, wireless sensor networks could be deployed in hostile environments where there are malicious attacks against the network. Providing security services in sensor networks, however, turns out to be a very challenging task. First, sensor nodes usually have limited resources such as storage, bandwidth, computation and energy. It is often undesirable to implement expensive algorithms (e. g. , frequent public key operations) on sensor nodes. Second, sensor nodes are usually deployed unattended and built without compromise prevention in mind. An attacker can easily capture and compromise a few sensor nodes without being noticed. When sensor nodes are compromised, the attacker can learn all the secrets stored on them and launch a variety of attacks. Thus, any security mechanism for sensor networks has to be resilient to compromised sensor nodes.
N° de réf. du vendeur 9780387327235
Wireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations. This book discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. It includes a fairly new study on capabilities of mu-TESLA, a broadcast authentication technique for wireless sensor networks. This volume assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain. The book is designed for a professional audience composed of researchers and practitioners in industry. It is also suitable as a secondary text for graduate-level students in computer science.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Visitez la page d’accueil du vendeur
Conditions générales et informations client
I. Conditions générales
§ 1 Dispositions de base
(1) Les conditions générales suivantes s?appliquent à tous les contrats que vous concluez avec nous en tant que fournisseur (AHA-BUCH GmbH) via les plateformes Internet AbeBooks et/ou ZVAB. Sauf accord contraire, l?inclusion de l?une de vos propres conditions générales que vous utilisez sera contestée
(2) Un consommateur au sens des règlements suivants est toute personne physique qui conclut une transact...
Pour plus d'informationNous expédions votre commande après les avoir reçues
pour les articles disponibles au plus tard 24 heures,
pour les articles avec un approvisionnement de nuit au plus tard 48 heures.
Dans le cas où nous devons commander un article auprès de notre fournisseur, notre délai d’expédition dépend de la date de réception des articles, mais les articles seront expédiés le jour même.
Notre objectif est d’envoyer les articles commandés de la manière la plus rapide, mais aussi la plus efficace et la plus sécurisée à nos clients.