Cantitate/Preț
Produs

From Problem to Solution

Editat de Zhen Jiang, Yi Pan
en Limba Engleză Hardback – 12 mai 2009
Reserving data authenticity in a hostile environment, where the sensor nodes may be compromised, is a critical security issue for wireless sensor networks. In such networks, once a real event is detected, nearby sensors generate data reports which are subsequently forwarded to the data collection point. However, the subverted sensors, which have access to the stored secret keys, can launch attacks to compromise data authenticity. They can act as sources for forged reports and inject an unlimited number of bogus reports that fabricate false events "happening" at arbitrary locations in the field. Such false reports may exhaust network energy and bandwidth resources, trigger false alarms and undesired reactions. The authors explain such attacks and that which can be roughly categorised as isolated attacks by each individual compromised node or colluding attacks by a group of collaborating impostors.
Citește tot Restrânge

Preț: 55751 lei

Preț vechi: 75413 lei
-26% Nou

Puncte Express: 836

Preț estimativ în valută:
10673 11094$ 8849£

Carte disponibilă

Livrare economică 17-31 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781604564570
ISBN-10: 1604564571
Pagini: 382
Ilustrații: tables & charts
Dimensiuni: 189 x 264 x 28 mm
Greutate: 0.86 kg
Editura: Nova Science Publishers Inc

Cuprins

Preserving Data Authenticity in Wireless Sensor Networks: Attacks and Countermeasures; Location Tracking Attack in Ad Hoc Networks based on Topology Information; Prevention of DoS Attack in Sensor Networks using Repeated Game Theory; Impact of Packet Injection Models on Misbehavior Detection Performance in Wireless Sensor Networks; Security Aware Routing in Hierarchical Optical Sensor Networks; Secure Multi-path Data Delivery in Sensor Networks; Secure Localisation for Wireless Sensor and Actor Network; A Formal Approach; An Energy Efficient Public Key Cryptosystem for Large Scale Wireless Sensor Networks; Energy Consumption of Security Algorithms in Wireless Sensor Networks; Foundations and Example Constructions; Asynchronous Random Key Pre-distribution in the Leap Framework for Wireless Sensor Networks; Secure K-Connectivity Properties of Wireless Sensor Networks; Gateway Subset Difference Revocation; Authenticated Key Exchange with Group Support for Wireless Sensor Networks; Tradeoff between Key-Exchange Frequency and Network Lifetime for Interconnected IEEE 802.15.4 Beacon Enabled Clusters; Secure Access Control from Location-Based Applications in WLAN Systems; Practical User Access Control in Sensor Networks; Index.