Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Security in WSN

    Posted By: szavatar
    Security in WSN

    Security in WSN
    I –– Publisher: Auerbach Publications | Pages: 360 | Publication Date: 2006 | ISBN: 0849370582 | PDF | 2.9 MB
    II –– Publisher: Springer | Pages: 238 | Publication Date: 2004 | ISBN: 3540243968 | PDF | 3.5 MB

    Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities. Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practitioners in the field. Containing thirteen invited chapters from internationally recognized security experts, this volume details attacks, encryption, authentication, watermarking, key management, secure routing, and secure aggregation, location, and cross-layer. It offers insight into attacking and defending routing mechanisms in ad hoc and sensor networks, and analyzes MAC layer attacks in 802.15.4 sensor networks.

    Table of Contents:

    SECTION I: ATTACKS
    1 Attacks and Defenses of Routing Mechanisms in Ad Hoc and Sensor Networks
    2 MAC Layer Attacks in 802.15.4 Sensor Networks

    SECTION II: ENCRYPTION, AUTHENTICATION, AND WATERMARKING
    3 Securing Radio Frequency Identification
    4 Watermarking Technique for Sensor Networks: Foundations and Applications

    SECTION III: KEY MANAGEMENT
    5 Group Key Management in Sensor Networks
    6 Key Management Schemes for Wireless Sensor Networks
    7 Key Management for Wireless Sensor Networks in Hostile Environments

    SECTION IV: SECURE ROUTING
    8 Scalable Security in Wireless Sensor and Actuator Networks (WSANs)
    9 Security Issues in Ad Hoc Networks
    10 Security in Wireless Sensor Networks: A Survey

    SECTION V: SECURE AGGREGATION, LOCATION, AND CROSS-LAYER
    11 Secure In-Network Processing in Sensor Networks
    12 Secure Localization in Sensor Networks
    13 Cross-Layer Design for the Security of Wireless Sensor Networks


    Security in Ad Hoc and Sensor Networks

    Ad hoc and sensor networks are making their way from research to real-world deployments. Body and personal-area networks, intelligent homes, environmen- tal monitoring or intervehicle communications: there is almost nothing left that is not going to be "smart" and "networked." While a great amount of research has been devoted to the pure networking aspects, ad hoc and sensor networks will not be successfully deployed if security, dependability and privacy issues are not addressed adequately. These issues are very important because ad hoc and sensor networks are usually used for very critical applications. Furthermore, they are very vulnerable because they are, most of the time, deployed in open and unprotected environments.
    At ESAS 2004, researchers with interests in both networking and security came together to present and discuss the latest ideas and concepts in the design of secure, dependable and privacy-preserving ad hoc and sensor networks. In the keynote speeches, Jean-Pierre Hubaux (EPFL, Switzerland) discussed the challenges of ad hoc network security, and Antonis Galetsas (European Com- mission, DG Information Society) presented the current and future activities of the European Commission on these topics.
    Out of 55 high-quality submissions, the program committee selected 17 papers for publication. The program covered the full spectrum of security-related issues, including key distribution and management, authentication, energy-aware cryptographic primitives, anonymity/pseudonymity, secure diffusion, secure P2P overlays and RFIDs.

    Table of Contents:

    New Research Challenges for the Security of Ad Hoc and Sensor Networks

    Public Key Cryptography in Sensor Networks—Revisited

    Exploring Message Authentication in Sensor Networks

    Secure Initialization in Single-Hop Radio Networks

    Some Methods for Privacy in RFID Communication

    Ring Signature Schemes for General Ad-Hoc Access Structures

    Linking Ad Hoc Charging Schemes to AAAC Architectures

    Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups

    Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems

    Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH

    Secure Overlay for Service Centric Wireless Sensor Networks

    IKE in Ad Hoc IP Networking


    Rapidshare Premium Link:



    NO MIRRORS PLEASE