|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-0-387-46276-9 |
003 |
DE-He213 |
005 |
20220119170244.0 |
007 |
cr nn 008mamaa |
008 |
100301s2007 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387462769
|9 978-0-387-46276-9
|
024 |
7 |
|
|a 10.1007/978-0-387-46276-9
|2 doi
|
050 |
|
4 |
|a TK5101-5105.9
|
072 |
|
7 |
|a TJK
|2 bicssc
|
072 |
|
7 |
|a TEC041000
|2 bisacsh
|
072 |
|
7 |
|a TJK
|2 thema
|
082 |
0 |
4 |
|a 621.382
|2 23
|
245 |
1 |
0 |
|a Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
|h [electronic resource] /
|c edited by Radha Poovendran, Cliff Wang, Sumit Roy.
|
250 |
|
|
|a 1st ed. 2007.
|
264 |
|
1 |
|a New York, NY :
|b Springer US :
|b Imprint: Springer,
|c 2007.
|
300 |
|
|
|a XIV, 394 p. 40 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Information Security,
|x 2512-2193 ;
|v 30
|
505 |
0 |
|
|a Localization Techniques -- Range-Free Localization -- A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks -- Learning Sensor Location from Signal Strength and Connectivity -- Node Localization Using Mobile Robots in Delay-Tolerant Sensor Networks -- Experiences from the Empirical Evaluation of Two Physical Layers for Node Localization -- Secure Localization -- Robust Wireless Localization: Attacks and Defenses -- Secure and Resilient Localization in Wireless Sensor Networks -- Secure Localization for Wireless Sensor Networks using Range-Independent Methods -- TRaVarSeL-Transmission Range Variation based Secure Localization -- Secure Sequence-based Localization for Wireless Networks -- Securing Localization in Wireless Networks (using Verifiable Multilateration and Covert Base Stations) -- Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks -- Location Privacy in Wireless LAN -- Secure Time Synchronization -- Time Synchronization Attacks in Sensor Networks -- Secure and Resilient Time Synchronization in Wireless Sensor Networks -- Securing Timing Synchronization in Sensor Networks.
|
520 |
|
|
|a Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks presents the latest research results in the area of secure localization and time synchronization for both wireless mobile ad hoc networks and wireless sensor networks. Recent advances in computing have exposed the potential security problems inherent in mobile ad hoc and wireless sensor networks. Subject to attacks and intrusions due to its open spectrum nature, wireless network localization and synchronization must be both robust and secure. Localization and time synchronization are critical processes for achieving sensor network security. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging. This edited volume evolved from an ARO special workshop on Localization in Wireless Sensor Networks at the University of Washington, and includes contributions from the leading researchers in secure localization, time synchronization, and protocol verifications. This book presents the challenges posed, potential solutions, and directions for further research, while including implementation studies with mica2 mote sensors. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks is designed for researchers, developers and practitioners in the area of secure wireless systems. Advanced-level students in computer science, especially in the area of wireless systems and security, will undoubtedly find this an invaluable reference tool. This book is also suitable for use as a textbook for courses in wireless systems and security.
|
650 |
|
0 |
|a Telecommunication.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Computer engineering.
|
650 |
|
0 |
|a Coding theory.
|
650 |
1 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Computer Engineering and Networks.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
700 |
1 |
|
|a Poovendran, Radha.
|e editor.
|0 (orcid)0000-0003-0269-8097
|1 https://orcid.org/0000-0003-0269-8097
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Wang, Cliff.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Roy, Sumit.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387512501
|
776 |
0 |
8 |
|i Printed edition:
|z 9781441940964
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387327211
|
830 |
|
0 |
|a Advances in Information Security,
|x 2512-2193 ;
|v 30
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-0-387-46276-9
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|