Nova Publishers
My Account Nova Publishers Shopping Cart
HomeBooksSeriesJournalsReference CollectionseBooksInformationSalesImprintsFor Authors
  Top » Catalog » Books » Computer Science and Robotics » My Account  |  Cart Contents  |  Checkout   
Quick Find
Use keywords to find the product you are looking for.
Advanced Search
What's New? more
The Iran Nuclear Agreement and Joint Comprehensive Plan of Action: Elements and Considerations
Shopping Cart more
0 items
Shipping & Returns
Privacy Notice
Conditions of Use
Contact Us
01.Robotics in Surgery: History, Current and Future Applications
02.From Problem Toward Solution: Wireless Sensor Networks Security
03.Introduction to Graph and Hypergraph Theory
04.Wiki Supporting Formal and Informal Learning
05.Intelligent Vehicle Systems: A 4D/RCS Approach
06.Artificial Intelligence in Energy and Renewable Energy Systems
07.Advances in Security Information Management: Perceptions and Outcomes
08.Computer Vision and Robotics
09.MOSFETs: Properties, Preparations and Performance
10.Expert Systems Research Trends
Notifications more
NotificationsNotify me of updates to From Problem Toward Solution: Wireless Sensor Networks Security
Tell A Friend
Tell someone you know about this product.
From Problem Toward Solution: Wireless Sensor Networks Security
Retail Price: $110.00
10% Online Discount
You Pay:

Editors: Zhen Jiang (Department of Computer Science, West Chester University, PA), Yi Pan (Department Computer Science, Georgia State University, Atlanta, GA)
Book Description:
Wireless sensor networks have experienced an explosive growth during the last few years. Security issues are a central concern for achieving secured communications in these networks. This book provides a compilation of chapters written by experts from academia and industry. It addresses the critical resource constraints in such networks and reveals new insights into practical solutions of the complex security issues that arise in them. Topics include, but are not limited to, attacks, malicious node detection, access control, authentication, cryptographic protocols, key management, and secure routing. It is suitable for undergraduate seniors and graduate students taking related courses as well as researchers in the field of wireless sensor networks security.

Table of Contents:
Preface pp. i-xiii

Part 1: Attacks and Countermeasures;pp. 1

Chapter 1: Preserving Data Authenticity in Wireless Sensor Networks: Attacks and Countermeasures;pp. 3-22
(F. Ye, H. Yang, S. Wong, S. Lu, Z. Liu, L. Zhang and M. Srivastava)

Chapter 2: Location Tracking Attack in Ad Hoc Networks based on Topology Information;pp. 23-45
(B. Bako, F. Kargl, E. Schoch and M. Weber)

Chapter 3: Prevention of DoS Attack in Sensor Networks using Repeated Game Theory;pp. 47-62
(A. Agah, M. Asadi and S. Das)

Chapter 4: Impact of Packet Injection Models on Misbehavior Detection Performance in Wireless Sensor Networks;pp. 63-90
(S. Schaust, M. Drozda and H. Szczerbicka)

Part 2: Secured Routing and Localization;pp. 91

Chapter 5: Security Aware Routing in Hierarchical Optical Sensor Networks;pp. 93-106
(U. Okorafor and D. Kundur)

Chapter 6: Secure Multi-path Data Delivery in Sensor Networks;pp. 107-128
(D. Huang)

Chapter 7: SeLoc: Secure Localization for Wireless Sensor and Actor Network;pp. 129-142
(J. Ma, S. Zhang and X. Tong)

Part 3: Cryptography and Encryption;pp. 143

Chapter 8: Security in Wireless Sensor Networks: A Formal Approach;pp. 145-164
(L. Tobarra, D. Cazorla and F. Cuartero)

Chapter 9:
C4W: An Energy Efficient Public Key Cryptosystem for Large Scale Wireless Sensor Networks;pp. 165-177
(Q. Jing, J. Hu and Z. Chen)

Chapter 10: Energy Consumption of Security Algorithms in Wireless Sensor Networks;pp. 179-207
(C. Chang, D. Nagel and S. Muftic)

Part 4: Key Pre-distribution and Revocation;pp. 209
Chapter 11: Deterministic and Randomized Key Pre-distribution Schemes for Mobile Ad-Hoc Networks: Foundations and Example Constructions;pp. 211-233
(E. Makri and Y. Stamatiou)

Chapter 12: ARPD: Asynchronous Random Key Pre-distribution in the Leap Framework for Wireless Sensor Networks;pp. 235-256
(A. Achtzehn, C. Rohner and I. Rodhe)

Chapter 13: Secure K-Connectivity Properties of Wireless Sensor Networks;pp. 257-270
(Y. Law, L. Yen, R. Pietro and M. Palaniswami)

Chapter 14: Gateway Subset Difference Revocation;pp. 271-282
(J. Opper, B. Decleene and M. Leung)

Part 5: Key Exchange and Access Control;pp. 283

Chapter 15:
Authenticated Key Exchange with Group Support for Wireless Sensor Networks;pp. 285-311
(P. Svenda and V. Matyas)

Chapter 16: Tradeoff between Key-Exchange Frequency and Network Lifetime for Interconnected IEEE 802.15.4 Beacon Enabled Clusters;pp. 313-331
(J. Misic)

Chapter 17: Secure Access Control for (Location-Based Applications in WLAN Systems;pp. 333-348
(Y. Cho, M. Goodrich and L. Bao)

Chapter 18: Practical User Access Control in Sensor Networks;pp. 349-368
(H. Wang and Q. Li)

Index pp. 369-382

      Distributed, Cluster and Grid Computing - Yi Pan (Georgia State University), Series Editor
   Binding: Hardcover
   Pub. Date: 2009
   Pages: 395, 7 x 10
   ISBN: 978-1-60456-457-0
   Status: AV
Status Code Description
AN Announcing
FM Formatting
PP Page Proofs
FP Final Production
EP Editorial Production
PR At Prepress
AP At Press
AV Available
Customers who bought this product also purchased
Dynamic Fuzzy Logic and its Applications
Dynamic Fuzzy Logic and its Applications
Concurrent and Parallel Computing: Theory, Implementation and Applications
Concurrent and Parallel Computing: Theory, Implementation and Applications
Special Focus Titles
01.Adrenal Glands: From Pathophysiology to Clinical Evidence
02.Misperceptions of Intimate Partner Violence in the 21st Century: Two Decades of Lies
03.Mental and Holistic Health: Some International Perspectives
04.Psychiatry Board Review
05.Youth Suicide Prevention: Everybody’s Business
06.Crisis Management: A Leadership Perspective
07.A Difficult World: Examining the Roots of Capitalism
08.From Medicinal Chemistry to Food Science: A Transfer of In Silico Methods Applications
09.Bioactive Compounds in Wine: Recent Advances and Perspectives
10.A Primer for Swimming Coaches. Volume 2: Biomechanical Foundations
11.Microbiological Food Hygiene
12.Forest Plantation Development and Management in Ghana

Nova Science Publishers
© Copyright 2004 - 2015

From Problem Toward Solution: Wireless Sensor Networks Security