Security in Sensor Networks

Author:   Yang Xiao (The University of Alabama, Tuscaloosa, USA) ,  Yang Xiao (The University of Alabama, Tuscaloosa, USA) ,  Vojislav B. Mišic (University of Manitoba, Winnipeg, Canada) ,  Krishna M. Sivalingam (University of Maryland, Baltimore, USA University of Maryland, Baltimore, USA)
Publisher:   Taylor & Francis Ltd
ISBN:  

9780849370588


Pages:   358
Publication Date:   15 August 2006
Format:   Hardback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $310.50 Quantity:  
Add to Cart

Share |

Security in Sensor Networks


Add your own review!

Overview

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities. Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practitioners in the field. Containing thirteen invited chapters from internationally recognized security experts, this volume details attacks, encryption, authentication, watermarking, key management, secure routing, and secure aggregation, location, and cross-layer. It offers insight into attacking and defending routing mechanisms in ad hoc and sensor networks, and analyzes MAC layer attacks in 802.15.4 sensor networks. About the Author Before joining the Department of Computer Science at the University of Alabama in 2006, and his prior position at the University of Memphis in 2002, Dr. Yang Xiao was an accomplished Medium Access Control (MAC) architect deeply involved in IEEE 802.11 standard enhancement. A former voting member of IEEE 802.11 Working Group, he serves as editor or on the editorial boards of numerous prestigious journals that cover emerging topics within mobile and wireless computing. A co-editor of seven books, he also serves as a referee/reviewer for many funding agencies, as well as a panelist for the National Science Foundation.

Full Product Details

Author:   Yang Xiao (The University of Alabama, Tuscaloosa, USA) ,  Yang Xiao (The University of Alabama, Tuscaloosa, USA) ,  Vojislav B. Mišic (University of Manitoba, Winnipeg, Canada) ,  Krishna M. Sivalingam (University of Maryland, Baltimore, USA University of Maryland, Baltimore, USA)
Publisher:   Taylor & Francis Ltd
Imprint:   Auerbach
Dimensions:   Width: 15.60cm , Height: 2.40cm , Length: 23.40cm
Weight:   0.635kg
ISBN:  

9780849370588


ISBN 10:   0849370582
Pages:   358
Publication Date:   15 August 2006
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Attacks. Encryption, authentication, and watermarking. Key managements. Secure routing. Secure aggregation, location, and cross-layer.

Reviews

Author Information

Yang Xiao

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List