From problem toward solution : wireless sensor networks security /
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York :
Nova Science Publishers,
©2009.
|
Colección: | Distributed, cluster, and grid computing.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Preserving data authenticity in wireless sensor networks: attacks and countermeasures / Fan Ye [and others]
- Location tracking attack in ad hoc networks based on topology information / Boto Bako [and others]
- Prevention of DOS attack in sensor networks using repeated game theory / Afrand Agah, Mehran Asadi and Sajal K. Das
- Impact of packet injection models on misbehavior detection performance in wireless sensor networks / Sven Schaust, Martin Drozda and Helena Szczerbicka
- Security aware routing in hierarchical optical sensor networks / Unoma Ndili Okorafor and Deepa Kundur
- Secure multi-path data delivery in sensor networks / Dijiang Huang
- SELOC: secure localization for wireless sensor and actor network / Jianqing Ma, Shiyong Zhang and Xiaowen Tong
- Security in wireless sensor networks: a formal approach / Llanos Tobarra, Diego Cazorlas and Fernando Cuartero
- C4W: an energy efficient public key cryptosystem for large-scale wireless sensor networks / Qi Jing, Joanbin Hu and Zhong Chen
- Energy consumption of security algorithms in wireless sensor nodes / Chih-Chun Chang, David J. Nagel and Sead Muftic
- Deterministic and randomized key pre-distribution schemes for mobile ad-hoc networks: foundations and example constructions / Effie Makri and Yannis C. Stamatiou
- ARPD: asynchronous random key predistribution in the leap framework for wireless sensor networks / Andreas Achtzehn, Christian Rohner and Ionna Rodhe
- Secure k-connectivity properties of wireless sensor networks / Yee Wei Law [and others]
- Gateway subset difference revocation / Jeffrey Opper, Brian DeCleene and May Leung
- Authenticated key exchange with group support for wireless sensor networks / Petr Švenda and Václav Matyáš
- Tradeoff between key-exchange frequency and network lifetime for interconnected IEEE 802.15.4 beacon enabled clusters Jelena Mišić
- Secure access control for location-based applications in WLAN systems / YounSun Cho, Michael Goodrich and Lichun Bao
- Practical user access control in sensor networks / HaodongWang and Qun Li.