did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781604564570

From Problem to Solution : Wireless Sensor Networks Security

by ;
  • ISBN13:

    9781604564570

  • ISBN10:

    1604564571

  • Format: Hardcover
  • Copyright: 2009-03-15
  • Publisher: Nova Science Pub Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $87.00

Summary

Reserving data authenticity in a hostile environment, where the sensor nodes may be compromised, is a critical security issue for wireless sensor networks. In such networks, once a real event is detected, nearby sensors generate data reports which are subsequently forwarded to the data collection point. However, the subverted sensors, which have access to the stored secret keys, can launch attacks to compromise data authenticity. They can act as sources for forged reports and inject an unlimited number of bogus reports that fabricate false events "happening" at arbitrary locations in the field. Such false reports may exhaust network energy and bandwidth resources, trigger false alarms and undesired reactions. The authors explain such attacks and that which can be roughly categorised as isolated attacks by each individual compromised node or colluding attacks by a group of collaborating impostors.

Table of Contents

Preserving Data Authenticity in Wireless Sensor Networks: Attacks and Countermeasures
Location Tracking Attack in Ad Hoc Networks based on Topology Information
Prevention of DoS Attack in Sensor Networks using Repeated Game Theory
Impact of Packet Injection Models on Misbehavior Detection Performance in Wireless Sensor Networks
Security Aware Routing in Hierarchical Optical Sensor Networks
Secure Multi-path Data Delivery in Sensor Networks
Secure Localisation for Wireless Sensor and Actor Network
A Formal Approach
An Energy Efficient Public Key Cryptosystem for Large Scale Wireless Sensor Networks
Energy Consumption of Security Algorithms in Wireless Sensor Networks
Foundations and Example Constructions
Asynchronous Random Key Pre-distribution in the Leap Framework for Wireless Sensor Networks
Secure K-Connectivity Properties of Wireless Sensor Networks
Gateway Subset Difference Revocation
Authenticated Key Exchange with Group Support for Wireless Sensor Networks
Tradeoff between Key-Exchange Frequency and Network Lifetime for Interconnected IEEE 802.15.4 Beacon Enabled Clusters
Secure Access Control from Location-Based Applications in WLAN Systems
Practical User Access Control in Sensor Networks
Index
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program