Nova Publishers
My Account Nova Publishers Shopping Cart
HomeBooksSeriesJournalsReference CollectionseBooksInformationSalesImprintsFor Authors
            
  Top » Catalog » Books » My Account  |  Cart Contents  |  Checkout   
Quick Find
  
Use keywords to find the product you are looking for.
Advanced Search
What's New? more
Doxycycline: Medical Uses and Effects
$82.00
Shopping Cart more
0 items
Information
Shipping & Returns
Privacy Notice
Conditions of Use
Contact Us
Notifications more
NotificationsNotify me of updates to From Problem Toward Solution: Wireless Sensor Networks Security
Tell A Friend
 
Tell someone you know about this product.
From Problem Toward Solution: Wireless Sensor Networks Security
Retail Price: $110.00
10% Online Discount
You Pay:

$99.00
Editors: Zhen Jiang (Department of Computer Science, West Chester University, PA), Yi Pan (Department Computer Science, Georgia State University, Atlanta, GA)
Book Description:
Wireless sensor networks have experienced an explosive growth during the last few years. Security issues are a central concern for achieving secured communications in these networks. This book provides a compilation of chapters written by experts from academia and industry. It addresses the critical resource constraints in such networks and reveals new insights into practical solutions of the complex security issues that arise in them. Topics include, but are not limited to, attacks, malicious node detection, access control, authentication, cryptographic protocols, key management, and secure routing. It is suitable for undergraduate seniors and graduate students taking related courses as well as researchers in the field of wireless sensor networks security.

Table of Contents:
Preface pp. i-xiii

Part 1: Attacks and Countermeasures;pp. 1

Chapter 1: Preserving Data Authenticity in Wireless Sensor Networks: Attacks and Countermeasures;pp. 3-22
(F. Ye, H. Yang, S. Wong, S. Lu, Z. Liu, L. Zhang and M. Srivastava)

Chapter 2: Location Tracking Attack in Ad Hoc Networks based on Topology Information;pp. 23-45
(B. Bako, F. Kargl, E. Schoch and M. Weber)

Chapter 3: Prevention of DoS Attack in Sensor Networks using Repeated Game Theory;pp. 47-62
(A. Agah, M. Asadi and S. Das)

Chapter 4: Impact of Packet Injection Models on Misbehavior Detection Performance in Wireless Sensor Networks;pp. 63-90
(S. Schaust, M. Drozda and H. Szczerbicka)

Part 2: Secured Routing and Localization;pp. 91

Chapter 5: Security Aware Routing in Hierarchical Optical Sensor Networks;pp. 93-106
(U. Okorafor and D. Kundur)

Chapter 6: Secure Multi-path Data Delivery in Sensor Networks;pp. 107-128
(D. Huang)

Chapter 7: SeLoc: Secure Localization for Wireless Sensor and Actor Network;pp. 129-142
(J. Ma, S. Zhang and X. Tong)

Part 3: Cryptography and Encryption;pp. 143

Chapter 8: Security in Wireless Sensor Networks: A Formal Approach;pp. 145-164
(L. Tobarra, D. Cazorla and F. Cuartero)

Chapter 9:
C4W: An Energy Efficient Public Key Cryptosystem for Large Scale Wireless Sensor Networks;pp. 165-177
(Q. Jing, J. Hu and Z. Chen)

Chapter 10: Energy Consumption of Security Algorithms in Wireless Sensor Networks;pp. 179-207
(C. Chang, D. Nagel and S. Muftic)

Part 4: Key Pre-distribution and Revocation;pp. 209
Chapter 11: Deterministic and Randomized Key Pre-distribution Schemes for Mobile Ad-Hoc Networks: Foundations and Example Constructions;pp. 211-233
(E. Makri and Y. Stamatiou)

Chapter 12: ARPD: Asynchronous Random Key Pre-distribution in the Leap Framework for Wireless Sensor Networks;pp. 235-256
(A. Achtzehn, C. Rohner and I. Rodhe)

Chapter 13: Secure K-Connectivity Properties of Wireless Sensor Networks;pp. 257-270
(Y. Law, L. Yen, R. Pietro and M. Palaniswami)

Chapter 14: Gateway Subset Difference Revocation;pp. 271-282
(J. Opper, B. Decleene and M. Leung)

Part 5: Key Exchange and Access Control;pp. 283

Chapter 15:
Authenticated Key Exchange with Group Support for Wireless Sensor Networks;pp. 285-311
(P. Svenda and V. Matyas)

Chapter 16: Tradeoff between Key-Exchange Frequency and Network Lifetime for Interconnected IEEE 802.15.4 Beacon Enabled Clusters;pp. 313-331
(J. Misic)

Chapter 17: Secure Access Control for (Location-Based Applications in WLAN Systems;pp. 333-348
(Y. Cho, M. Goodrich and L. Bao)

Chapter 18: Practical User Access Control in Sensor Networks;pp. 349-368
(H. Wang and Q. Li)

Index pp. 369-382

   Series:
      Distributed, Cluster and Grid Computing - Yi Pan (Georgia State University), Series Editor
   Binding: Hardcover
   Pub. Date: 2009
   Pages: 395, 7 x 10
   ISBN: 978-1-60456-457-0
   Status: AV
  
Status Code Description
AN Announcing
FM Formatting
PP Page Proofs
FP Final Production
EP Editorial Production
PR At Prepress
AP At Press
AV Available
  
Customers who bought this product also purchased
Dynamic Fuzzy Logic and its Applications
Dynamic Fuzzy Logic and its Applications
Concurrent and Parallel Computing: Theory, Implementation and Applications
Concurrent and Parallel Computing: Theory, Implementation and Applications
Special Focus Titles
01.Violent Communication and Bullying in Early Childhood Education
02.Cultural Considerations in Intervention with Women and Children Exposed to Intimate Partner Violence
03.Chronic Disease and Disability: The Pediatric Lung
04.Fruit and Vegetable Consumption and Health: New Research
05.Fire and the Sword: Understanding the Impact and Challenge of Organized Islamism. Volume 2

Nova Science Publishers
© Copyright 2004 - 2020

From Problem Toward Solution: Wireless Sensor Networks Security