|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Yingying Chen , Wenyuan Xu , Wade Trappe , YanYong ZhangPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: Softcover reprint of hardcover 1st ed. 2009 Dimensions: Width: 15.50cm , Height: 1.90cm , Length: 23.50cm Weight: 0.581kg ISBN: 9781441946935ISBN 10: 1441946934 Pages: 362 Publication Date: 05 November 2010 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsSecure Localization.- Overview of Wireless Localization.- On the Robustness of Localization Algorithms to Signal Strength Attacks.- Attack Detection in Wireless Localization.- Robust Statistical Methods for Attack-tolerant Localization.- Spatio-Temporal Access Control by Dual-using Sensor Networks.- Defending Against Wireless Spoofing Attacks.- Relationship-based Detection of Spoofing-related Anomalous Traffic.- Detecting and Localizing Wireless Spoofing Attacks.- Defending Against Radio Interference.- A Brief Survey of Jamming and Defense Strategies.- Jamming Attacks and Radio Interference.- Detecting Jamming Attacks and Radio Interference.- Channel Surfing: Defending Wireless Networks against Radio Interference.- Preserving Privacy in Wireless Networks.- Enhancing Source-Location Privacy in Sensor Network Routing.- Temporal Privacy in Wireless Networks.- Securing Wireless Systems via Lower Layer Enforcements.- Concluding Remarks.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |