Table of Contents: Preface pp. i-xiii
Part 1: Attacks and Countermeasures;pp. 1
Chapter 1: Preserving Data Authenticity in Wireless Sensor Networks: Attacks and Countermeasures;pp. 3-22
(F. Ye, H. Yang, S. Wong, S. Lu, Z. Liu, L. Zhang and M. Srivastava)
Chapter 2: Location Tracking Attack in Ad Hoc Networks based on Topology Information;pp. 23-45
(B. Bako, F. Kargl, E. Schoch and M. Weber)
Chapter 3: Prevention of DoS Attack in Sensor Networks using Repeated Game Theory;pp. 47-62
(A. Agah, M. Asadi and S. Das)
Chapter 4: Impact of Packet Injection Models on Misbehavior Detection Performance in Wireless Sensor Networks;pp. 63-90
(S. Schaust, M. Drozda and H. Szczerbicka)
Part 2: Secured Routing and Localization;pp. 91
Chapter 5: Security Aware Routing in Hierarchical Optical Sensor Networks;pp. 93-106
(U. Okorafor and D. Kundur)
Chapter 6: Secure Multi-path Data Delivery in Sensor Networks;pp. 107-128
(D. Huang)
Chapter 7: SeLoc: Secure Localization for Wireless Sensor and Actor Network;pp. 129-142
(J. Ma, S. Zhang and X. Tong)
Part 3: Cryptography and Encryption;pp. 143
Chapter 8: Security in Wireless Sensor Networks: A Formal Approach;pp. 145-164
(L. Tobarra, D. Cazorla and F. Cuartero)
Chapter 9:
C4W: An Energy Efficient Public Key Cryptosystem for Large Scale Wireless Sensor Networks;pp. 165-177
(Q. Jing, J. Hu and Z. Chen)
Chapter 10: Energy Consumption of Security Algorithms in Wireless Sensor Networks;pp. 179-207
(C. Chang, D. Nagel and S. Muftic)
Part 4: Key Pre-distribution and Revocation;pp. 209
Chapter 11: Deterministic and Randomized Key Pre-distribution Schemes for Mobile Ad-Hoc Networks: Foundations and Example Constructions;pp. 211-233
(E. Makri and Y. Stamatiou)
Chapter 12: ARPD: Asynchronous Random Key Pre-distribution in the Leap Framework for Wireless Sensor Networks;pp. 235-256
(A. Achtzehn, C. Rohner and I. Rodhe)
Chapter 13: Secure K-Connectivity Properties of Wireless Sensor Networks;pp. 257-270
(Y. Law, L. Yen, R. Pietro and M. Palaniswami)
Chapter 14: Gateway Subset Difference Revocation;pp. 271-282
(J. Opper, B. Decleene and M. Leung)
Part 5: Key Exchange and Access Control;pp. 283
Chapter 15:
Authenticated Key Exchange with Group Support for Wireless Sensor Networks;pp. 285-311
(P. Svenda and V. Matyas)
Chapter 16: Tradeoff between Key-Exchange Frequency and Network Lifetime for Interconnected IEEE 802.15.4 Beacon Enabled Clusters;pp. 313-331
(J. Misic)
Chapter 17: Secure Access Control for (Location-Based Applications in WLAN Systems;pp. 333-348
(Y. Cho, M. Goodrich and L. Bao)
Chapter 18: Practical User Access Control in Sensor Networks;pp. 349-368
(H. Wang and Q. Li)
Index pp. 369-382 |