Security in WSN

Posted By: szavatar

Security in WSN
I –– Publisher: Auerbach Publications | Pages: 360 | Publication Date: 2006 | ISBN: 0849370582 | PDF | 2.9 MB
II –– Publisher: Springer | Pages: 238 | Publication Date: 2004 | ISBN: 3540243968 | PDF | 3.5 MB

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities. Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practitioners in the field. Containing thirteen invited chapters from internationally recognized security experts, this volume details attacks, encryption, authentication, watermarking, key management, secure routing, and secure aggregation, location, and cross-layer. It offers insight into attacking and defending routing mechanisms in ad hoc and sensor networks, and analyzes MAC layer attacks in 802.15.4 sensor networks.

Table of Contents:

SECTION I: ATTACKS
1 Attacks and Defenses of Routing Mechanisms in Ad Hoc and Sensor Networks
2 MAC Layer Attacks in 802.15.4 Sensor Networks

SECTION II: ENCRYPTION, AUTHENTICATION, AND WATERMARKING
3 Securing Radio Frequency Identification
4 Watermarking Technique for Sensor Networks: Foundations and Applications

SECTION III: KEY MANAGEMENT
5 Group Key Management in Sensor Networks
6 Key Management Schemes for Wireless Sensor Networks
7 Key Management for Wireless Sensor Networks in Hostile Environments

SECTION IV: SECURE ROUTING
8 Scalable Security in Wireless Sensor and Actuator Networks (WSANs)
9 Security Issues in Ad Hoc Networks
10 Security in Wireless Sensor Networks: A Survey

SECTION V: SECURE AGGREGATION, LOCATION, AND CROSS-LAYER
11 Secure In-Network Processing in Sensor Networks
12 Secure Localization in Sensor Networks
13 Cross-Layer Design for the Security of Wireless Sensor Networks


Security in Ad Hoc and Sensor Networks

Ad hoc and sensor networks are making their way from research to real-world deployments. Body and personal-area networks, intelligent homes, environmen- tal monitoring or intervehicle communications: there is almost nothing left that is not going to be "smart" and "networked." While a great amount of research has been devoted to the pure networking aspects, ad hoc and sensor networks will not be successfully deployed if security, dependability and privacy issues are not addressed adequately. These issues are very important because ad hoc and sensor networks are usually used for very critical applications. Furthermore, they are very vulnerable because they are, most of the time, deployed in open and unprotected environments.
At ESAS 2004, researchers with interests in both networking and security came together to present and discuss the latest ideas and concepts in the design of secure, dependable and privacy-preserving ad hoc and sensor networks. In the keynote speeches, Jean-Pierre Hubaux (EPFL, Switzerland) discussed the challenges of ad hoc network security, and Antonis Galetsas (European Com- mission, DG Information Society) presented the current and future activities of the European Commission on these topics.
Out of 55 high-quality submissions, the program committee selected 17 papers for publication. The program covered the full spectrum of security-related issues, including key distribution and management, authentication, energy-aware cryptographic primitives, anonymity/pseudonymity, secure diffusion, secure P2P overlays and RFIDs.

Table of Contents:

New Research Challenges for the Security of Ad Hoc and Sensor Networks

Public Key Cryptography in Sensor Networks—Revisited

Exploring Message Authentication in Sensor Networks

Secure Initialization in Single-Hop Radio Networks

Some Methods for Privacy in RFID Communication

Ring Signature Schemes for General Ad-Hoc Access Structures

Linking Ad Hoc Charging Schemes to AAAC Architectures

Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups

Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems

Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH

Secure Overlay for Service Centric Wireless Sensor Networks

IKE in Ad Hoc IP Networking


Rapidshare Premium Link:



NO MIRRORS PLEASE