|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-04603-7 |
003 |
DE-He213 |
005 |
20220115183915.0 |
007 |
cr nn 008mamaa |
008 |
140220s2014 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319046037
|9 978-3-319-04603-7
|
024 |
7 |
|
|a 10.1007/978-3-319-04603-7
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
100 |
1 |
|
|a Mahmoud, Mohamed M. E. A.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Security for Multi-hop Wireless Networks
|h [electronic resource] /
|c by Mohamed M. E. A. Mahmoud, Xuemin (Sherman) Shen.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XIII, 99 p. 45 illus., 27 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a SpringerBriefs in Computer Science,
|x 2191-5776
|
505 |
0 |
|
|a Introduction -- System Model -- Efficient Incentive Scheme -- Secure Routing Protocols -- Conclusions and Future Directions.
|
520 |
|
|
|a This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security for Multi-hop Wireless Networks demonstrates recent research that enhances the efficiency and safety of these key networks. Concise and practical, it is a useful tool for researchers and professionals working in network security. It is also a valuable resource for advanced-level students interested in wireless communications and networking.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Telecommunication.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
700 |
1 |
|
|a Shen, Xuemin (Sherman).
|e author.
|0 (orcid)0000-0002-4140-287X
|1 https://orcid.org/0000-0002-4140-287X
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319046044
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319046020
|
830 |
|
0 |
|a SpringerBriefs in Computer Science,
|x 2191-5776
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-04603-7
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|