|
![]() |
|||
|
||||
OverviewThis book focuses on two of the most rapidly developing areas in wireless technology (WT) applications, namely, wireless sensors networks (WSNs) and wireless body area networks (WBANs). These networks can be considered smart applications of the recent WT revolutions. The book presents various security tools and scenarios for the proposed enhanced-security of WSNs, which are supplemented with numerous computer simulations. In the computer simulation section, WSN modeling is addressed using MATLAB programming language. Full Product DetailsAuthor: Mohsen A. M. El-Bendary , Mohsen MahmoudPublisher: Springer Verlag, Japan Imprint: Springer Verlag, Japan Edition: 2015 ed. Volume: 316 Dimensions: Width: 15.50cm , Height: 1.40cm , Length: 23.50cm Weight: 5.155kg ISBN: 9784431550686ISBN 10: 4431550682 Pages: 212 Publication Date: 27 November 2014 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsIntroduction.- Wireless Network Overview.- Sensing Networks.- WSN Overview.- WBAN Overview.- WSN and Embedding System Relation.- Wireless Sensing Networks Contents.- .Wireless, Mobile, and Ad-hoc Networks.- .Book Organizing.- . SENSING AND ENVIRONMENT CONCEPTS.- Introduction.- Sensing Definition.- Environment Concepts.- WSN and Environment.- Environment and Medical Care Concerns.- WSNs and Sensors.- Sensing Examples.- WIRELESS NETWORKS.- Introduction.- Low-Rate Wireless Networks.- Bluetooth Networks Architecture.- Adaptive packets of WPAN technology.- THROUGHPUT STUDY OF LOW-RATE COMMUNICATIONS.- Introduction.- Related Work.- Throughput Definition of WSN and WBAN.- Analysis of PEP.- The Proposed Scenarios.- Simulation Assumptions.- Simulation Results.- Chapter Recommendation.- WSN SECURITY NEEDS.- Introduction.- Security goals.- Fundamentals of Network Security.- Challenges of WSN Security.- WSN Implementation Technologies.- Summary.- LOWER COMPLEXITY OF SECURED WSN NETWORKS.- Power with FEC.- Complexity FEC dependant.- Interleaving Techniques.- Interleavers Investigation.- Chaotic Interleaver Structure.- Cryptography using Chaos.- Objective quality Metrics.- Jakes Method.- Mobility Effects.- Cooperative Algorithm of WSN.- Appendixes.ReviewsAuthor InformationName: MOHSEN AHMED MAHMOUD MOHAMED KASSEM EL-BENDARY. Date of birth: 20-9-1975. Phone: 002-02-33266239 Mobile: 0020-128-8712859 0020-106-0747274 Affiliation: Department of Electronics and Communications Technology, Faculty of Industrial Education, Helwan University, Cairo, Egypt. Qualifications: 1- BSc. in Electrical Communications, Faculty of Electronic Engineering, Menoufia University, May 1998. 2- MSc. in Electrical Communications “Improving Performance Bluetooth Networks through Channel Codding ”, Faculty of Electronic Engineering, Menoufia University, 2008. 3- PhD. in Electrical Communications “Efficient Multimedia Transmission over Bluetooth System”, Faculty of Electronic Engineering, Menoufia University, 2012. Tab Content 6Author Website:Countries AvailableAll regions |