|
![]() |
|||
|
||||
OverviewThis book focuses on two of the most rapidly developing areas in wireless technology (WT) applications, namely, wireless sensors networks (WSNs) and wireless body area networks (WBANs). These networks can be considered smart applications of the recent WT revolutions. The book presents various security tools and scenarios for the proposed enhanced-security of WSNs, which are supplemented with numerous computer simulations. In the computer simulation section, WSN modeling is addressed using MATLAB programming language. Full Product DetailsAuthor: Mohsen A. M. El-BendaryPublisher: Springer Verlag, Japan Imprint: Springer Verlag, Japan Edition: Softcover reprint of the original 1st ed. 2015 Volume: 316 Weight: 3.999kg ISBN: 9784431563570ISBN 10: 4431563571 Pages: 212 Publication Date: 10 September 2016 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsIntroduction.- Wireless Network Overview.- Sensing Networks.- WSN Overview.- WBAN Overview.- WSN and Embedding System Relation.- Wireless Sensing Networks Contents.- .Wireless, Mobile, and Ad-hoc Networks.- .Book Organizing.- . SENSING AND ENVIRONMENT CONCEPTS.- Introduction.- Sensing Definition.- Environment Concepts.- WSN and Environment.- Environment and Medical Care Concerns.- WSNs and Sensors.- Sensing Examples.- WIRELESS NETWORKS.- Introduction.- Low-Rate Wireless Networks.- Bluetooth Networks Architecture.- Adaptive packets of WPAN technology.- THROUGHPUT STUDY OF LOW-RATE COMMUNICATIONS.- Introduction.- Related Work.- Throughput Definition of WSN and WBAN.- Analysis of PEP.- The Proposed Scenarios.- Simulation Assumptions.- Simulation Results.- Chapter Recommendation.- WSN SECURITY NEEDS.- Introduction.- Security goals.- Fundamentals of Network Security.- Challenges of WSN Security.- WSN Implementation Technologies.- Summary.- LOWER COMPLEXITY OF SECURED WSN NETWORKS.- Power with FEC.- Complexity FEC dependant.- Interleaving Techniques.- Interleavers Investigation.- Chaotic Interleaver Structure.- Cryptography using Chaos.- Objective quality Metrics.- Jakes Method.- Mobility Effects.- Cooperative Algorithm of WSN.- Appendixes.ReviewsAuthor InformationName: MOHSEN AHMED MAHMOUD MOHAMED KASSEM EL-BENDARY. Date of birth: 20-9-1975. Phone: 002-02-33266239 Mobile: 0020-128-8712859 0020-106-0747274 Affiliation: Department of Electronics and Communications Technology, Faculty of Industrial Education, Helwan University, Cairo, Egypt. Qualifications: 1- BSc. in Electrical Communications, Faculty of Electronic Engineering, Menoufia University, May 1998. 2- MSc. in Electrical Communications “Improving Performance Bluetooth Networks through Channel Codding ”, Faculty of Electronic Engineering, Menoufia University, 2008. 3- PhD. in Electrical Communications “Efficient Multimedia Transmission over Bluetooth System”, Faculty of Electronic Engineering, Menoufia University, 2012. Tab Content 6Author Website:Countries AvailableAll regions |