Preserving Data Authenticity in Wireless Sensor Networks: Attacks and Countermeasures | |
Location Tracking Attack in Ad Hoc Networks based on Topology Information | |
Prevention of DoS Attack in Sensor Networks using Repeated Game Theory | |
Impact of Packet Injection Models on Misbehavior Detection Performance in Wireless Sensor Networks | |
Security Aware Routing in Hierarchical Optical Sensor Networks | |
Secure Multi-path Data Delivery in Sensor Networks | |
Secure Localisation for Wireless Sensor and Actor Network | |
A Formal Approach | |
An Energy Efficient Public Key Cryptosystem for Large Scale Wireless Sensor Networks | |
Energy Consumption of Security Algorithms in Wireless Sensor Networks | |
Foundations and Example Constructions | |
Asynchronous Random Key Pre-distribution in the Leap Framework for Wireless Sensor Networks | |
Secure K-Connectivity Properties of Wireless Sensor Networks | |
Gateway Subset Difference Revocation | |
Authenticated Key Exchange with Group Support for Wireless Sensor Networks | |
Tradeoff between Key-Exchange Frequency and Network Lifetime for Interconnected IEEE 802.15.4 Beacon Enabled Clusters | |
Secure Access Control from Location-Based Applications in WLAN Systems | |
Practical User Access Control in Sensor Networks | |
Index | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.