Nova Publishers
My Account Nova Publishers Shopping Cart
HomeBooksSeriesJournalsReference CollectionseBooksInformationSalesImprintsFor Authors
            
  Top » Catalog » Books » Computer Science and Robotics » My Account  |  Cart Contents  |  Checkout   
Quick Find
  
Use keywords to find the product you are looking for.
Advanced Search
What's New? more
Public Health Yearbook 2013
$279.00
Shopping Cart more
0 items
Information
Shipping & Returns
Privacy Notice
Conditions of Use
Contact Us
Bestsellers
01.Robotics in Surgery: History, Current and Future Applications
02.From Problem Toward Solution: Wireless Sensor Networks Security
03.Wiki Supporting Formal and Informal Learning
04.Introduction to Graph and Hypergraph Theory
05.Intelligent Vehicle Systems: A 4D/RCS Approach
06.Advances in Security Information Management: Perceptions and Outcomes
07.Artificial Intelligence in Energy and Renewable Energy Systems
08.Computer Vision and Robotics
09.MOSFETs: Properties, Preparations and Performance
10.Expert Systems Research Trends
Notifications more
NotificationsNotify me of updates to From Problem Toward Solution: Wireless Sensor Networks Security
Tell A Friend
 
Tell someone you know about this product.
From Problem Toward Solution: Wireless Sensor Networks Security
Retail Price: $110.00
10% Online Discount
You Pay:

$99.00
Editors: Zhen Jiang (Department of Computer Science, West Chester University, PA), Yi Pan (Department Computer Science, Georgia State University, Atlanta, GA)
Book Description:
Wireless sensor networks have experienced an explosive growth during the last few years. Security issues are a central concern for achieving secured communications in these networks. This book provides a compilation of chapters written by experts from academia and industry. It addresses the critical resource constraints in such networks and reveals new insights into practical solutions of the complex security issues that arise in them. Topics include, but are not limited to, attacks, malicious node detection, access control, authentication, cryptographic protocols, key management, and secure routing. It is suitable for undergraduate seniors and graduate students taking related courses as well as researchers in the field of wireless sensor networks security.

Table of Contents:
Preface pp. i-xiii

Part 1: Attacks and Countermeasures;pp. 1

Chapter 1: Preserving Data Authenticity in Wireless Sensor Networks: Attacks and Countermeasures;pp. 3-22
(F. Ye, H. Yang, S. Wong, S. Lu, Z. Liu, L. Zhang and M. Srivastava)

Chapter 2: Location Tracking Attack in Ad Hoc Networks based on Topology Information;pp. 23-45
(B. Bako, F. Kargl, E. Schoch and M. Weber)

Chapter 3: Prevention of DoS Attack in Sensor Networks using Repeated Game Theory;pp. 47-62
(A. Agah, M. Asadi and S. Das)

Chapter 4: Impact of Packet Injection Models on Misbehavior Detection Performance in Wireless Sensor Networks;pp. 63-90
(S. Schaust, M. Drozda and H. Szczerbicka)

Part 2: Secured Routing and Localization;pp. 91

Chapter 5: Security Aware Routing in Hierarchical Optical Sensor Networks;pp. 93-106
(U. Okorafor and D. Kundur)

Chapter 6: Secure Multi-path Data Delivery in Sensor Networks;pp. 107-128
(D. Huang)

Chapter 7: SeLoc: Secure Localization for Wireless Sensor and Actor Network;pp. 129-142
(J. Ma, S. Zhang and X. Tong)

Part 3: Cryptography and Encryption;pp. 143

Chapter 8: Security in Wireless Sensor Networks: A Formal Approach;pp. 145-164
(L. Tobarra, D. Cazorla and F. Cuartero)

Chapter 9:
C4W: An Energy Efficient Public Key Cryptosystem for Large Scale Wireless Sensor Networks;pp. 165-177
(Q. Jing, J. Hu and Z. Chen)

Chapter 10: Energy Consumption of Security Algorithms in Wireless Sensor Networks;pp. 179-207
(C. Chang, D. Nagel and S. Muftic)

Part 4: Key Pre-distribution and Revocation;pp. 209
Chapter 11: Deterministic and Randomized Key Pre-distribution Schemes for Mobile Ad-Hoc Networks: Foundations and Example Constructions;pp. 211-233
(E. Makri and Y. Stamatiou)

Chapter 12: ARPD: Asynchronous Random Key Pre-distribution in the Leap Framework for Wireless Sensor Networks;pp. 235-256
(A. Achtzehn, C. Rohner and I. Rodhe)

Chapter 13: Secure K-Connectivity Properties of Wireless Sensor Networks;pp. 257-270
(Y. Law, L. Yen, R. Pietro and M. Palaniswami)

Chapter 14: Gateway Subset Difference Revocation;pp. 271-282
(J. Opper, B. Decleene and M. Leung)

Part 5: Key Exchange and Access Control;pp. 283

Chapter 15:
Authenticated Key Exchange with Group Support for Wireless Sensor Networks;pp. 285-311
(P. Svenda and V. Matyas)

Chapter 16: Tradeoff between Key-Exchange Frequency and Network Lifetime for Interconnected IEEE 802.15.4 Beacon Enabled Clusters;pp. 313-331
(J. Misic)

Chapter 17: Secure Access Control for (Location-Based Applications in WLAN Systems;pp. 333-348
(Y. Cho, M. Goodrich and L. Bao)

Chapter 18: Practical User Access Control in Sensor Networks;pp. 349-368
(H. Wang and Q. Li)

Index pp. 369-382

   Series:
      Distributed, Cluster and Grid Computing - Yi Pan (Georgia State University), Series Editor
   Binding: Hardcover
   Pub. Date: 2009
   Pages: 395, 7 x 10
   ISBN: 978-1-60456-457-0
   Status: AV
  
Status Code Description
AN Announcing
FM Formatting
PP Page Proofs
FP Final Production
EP Editorial Production
PR At Prepress
AP At Press
AV Available
  
Customers who bought this product also purchased
Dynamic Fuzzy Logic and its Applications
Dynamic Fuzzy Logic and its Applications
Concurrent and Parallel Computing: Theory, Implementation and Applications
Concurrent and Parallel Computing: Theory, Implementation and Applications
Special Focus Titles
01.Mountains: Geology, Topography and Environmental Concerns
02.A Short History of the Georgian Church
03.Private Investigations: Suspicion of Financial Crime by White-Collar Criminals
04.Cellular and Molecular Mechanisms of Honey Wound Healing
05.Controversies in Preeclampsia
06.Bioengineering Nursing: New Horizons of Nursing Research
07.Innovation and Global Competition: The Case of Korea
08.Network-Based Continuing Medical Education: Social Media and Professional Development
09.Fractional Calculus in Analysis, Dynamics and Optimal Control
10.The Infinite History of NOW: A Timeless Background for Contemporary Physics
11.Borderline Personality Disorder: Understanding the Unconscious Function of Deliberate Self Harm and Managing the Transference Relationship
12.Energy and Environment Nowadays

Nova Science Publishers
© Copyright 2004 - 2014

From Problem Toward Solution: Wireless Sensor Networks Security