MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_on1232480587
003 OCoLC
005 20231120010529.0
006 m o d
007 cr cnu---unuuu
008 210125s2021 enka ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d OCLCO  |d OPELS  |d EBLCP  |d YDX  |d UKAHL  |d UKMGB  |d OCLCF  |d A7U  |d OCLCQ  |d OCLCO  |d K6U  |d OCLCQ  |d OCLCO 
015 |a GBC0E3392  |2 bnb 
016 7 |a 019949239  |2 Uk 
019 |a 1200651623  |a 1202451160  |a 1202467577  |a 1203963145  |a 1269098795  |a 1276833863 
020 |a 9780128232224  |q (electronic bk.) 
020 |a 0128232226  |q (electronic bk.) 
020 |z 9780128212554 
020 |z 0128212551 
035 |a (OCoLC)1232480587  |z (OCoLC)1200651623  |z (OCoLC)1202451160  |z (OCoLC)1202467577  |z (OCoLC)1203963145  |z (OCoLC)1269098795  |z (OCoLC)1276833863 
050 4 |a TK5105.8857  |b .S43 2021eb 
082 0 4 |a 005.8  |2 23 
245 0 0 |a Security and Privacy Issues in IoT Devices and Sensor Networks /  |c edited by Sudhir Kumar Sharma, Bharat Bhushan, Narayan C. Debnath. 
264 1 |a London, United Kingdom ;  |a San Diego, California :  |b Academic Press, an imprint of Elsevier,  |c [2021] 
300 |a 1 online resource (xvi, 318 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Advances in ubiquitous sensing applications for healthcare ;  |v volume 12 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a Intro -- Security and Privacy Issues in IoT Devices and Sensor Networks -- Copyright -- Contents -- Contributors -- Chapter 1: Wireless sensor networks: Concepts, components, and challenges -- 1. Introduction -- 1.1. Network design objective -- 1.2. Technological background -- 1.3. Network architecture -- 1.4. Classification of WSN -- 2. WSN communication pattern -- 2.1. Protocol stack of WSN -- 2.2. Medium access control at data link layer -- 2.3. Network layer -- 2.3.1. Routing protocol -- 2.4. Transport layer -- 3. WSN design challenges 
505 8 |a 4. Comparative analysis of optimized clustering algorithm -- 4.1. Cluster formation scenario -- 4.2. Optimized clustering strategy -- 5. Evaluation of clustering methods for optimization -- 5.1. Modeling of system -- 6. Result and analysis -- 7. Conclusion and future work -- References -- Chapter 2: Secure performance of emerging wireless sensor networks relying nonorthogonal multiple access -- 1. Brief history of IoT communications related to multiple access technique -- 2. Basic fundamentals of NOMA -- 3. NOMA and application in cooperation network 
505 8 |a 4. NOMA and cognitive radio-assisted IoT system -- 4.1. System model of IoT relying NOMA and CR -- 4.2. Outage probability analysis in case of partial relay selection -- 4.2.1. Performance analysis of the first user -- 4.2.2. Outage probability at D2 -- 5. Improving security at physical layer -- 6. Validating achievable expressions of outage behavior and secure performance via numerical simulation -- 7. Conclusion -- References -- Chapter 3: Security and privacy in wireless body sensor networks using lightweight cryptography scheme -- 1. Introduction -- 2. Motivation and objective of research 
505 8 |a 3. Related work -- 4. Proposed work -- 4.1. Sensor communication between the sensor nodes -- 4.2. Encryption and decryption -- 4.3. Secure communication between sensor head to remote server -- 4.4. Secure data access in cloud server -- 5. Performance analysis -- 6. Summary -- References -- Chapter 4: Impact of thermal effects on wireless body area networks and routing strategies -- 1. Introduction -- 2. Thermal-aware routing protocols -- 2.1. Thermal-aware routing algorithm (TARA) -- 2.2. Least temperature rise (LTR) -- 2.3. Least total route temperature (LTRT) 
505 8 |a 2.4. Hotspot preventing routing (HPR) -- 2.5. RAIN -- 2.6. Thermal-aware shortest hop routing protocol (TSHR) -- 2.7. M-ATTEMPT -- 2.8. TMQoS -- 2.9. RE-ATTEMPT -- 2.10. M2E2 multihop routing protocol -- 2.11. Thermal aware-localized QoS routing protocol -- 2.12. Trust and thermal-aware routing protocol -- 2.13. Self-healing thermal-aware RPL routing protocol -- 2.14. Multipath ring routing protocol -- 3. Introduction about the thermal influence on medical WSN -- 3.1. Problems faced by recent scenario -- 3.2. Thermal influence on human tissue 
650 0 |a Internet of things  |x Security measures. 
650 0 |a Sensor networks  |x Security measures. 
650 0 |a Data protection. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Internet des objets  |0 (CaQQLa)000269177  |x S�ecurit�e  |0 (CaQQLa)201-0373949  |x Mesures.  |0 (CaQQLa)201-0373949 
650 6 |a R�eseaux de capteurs  |0 (CaQQLa)201-0388026  |x S�ecurit�e  |0 (CaQQLa)201-0373949  |x Mesures.  |0 (CaQQLa)201-0373949 
650 6 |a Protection de l'information (Informatique)  |0 (CaQQLa)201-0061151 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Data protection  |2 fast  |0 (OCoLC)fst00887958 
700 1 |a Sharma, Sudhir Kumar,  |e editor. 
700 1 |a Bhushan, Bharat  |c (Software specialist),  |e editor. 
700 1 |a Debnath, N. C.  |q (Narayan C.),  |e editor. 
776 0 8 |i Print version:  |t Security and Privacy Issues in IoT Devices and Sensor Networks.  |d London, United Kingdom ; San Diego, California : Academic Press, an imprint of Elsevier, [2021]  |z 0128212551  |w (OCoLC)1155608590 
830 0 |a Advances in ubiquitous sensing applications for healthcare ;  |v v. 12. 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128212554  |z Texto completo