Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security in Sensor Networks

Buy

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.

Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practitioners in the field. Containing thirteen invited chapters from internationally recognized security experts, this volume details attacks, encryption, authentication, watermarking, key management, secure routing, and secure aggregation, location, and cross-layer. It offers insight into attacking and defending routing mechanisms in ad hoc and sensor networks, and analyzes MAC layer attacks in 802.15.4 sensor networks.

About the Author
Before joining the Department of Computer Science at the University of Alabama in 2006, and his prior position at the University of Memphis in 2002, Dr. Yang Xiao was an accomplished Medium Access Control (MAC) architect deeply involved in IEEE 802.11 standard enhancement. A former voting member of IEEE 802.11 Working Group, he serves as editor or on the editorial boards of numerous prestigious journals that cover emerging topics within mobile and wireless computing. A co-editor of seven books, he also serves as a referee/reviewer for many funding agencies, as well as a panelist for the National Science Foundation.

(HTML tags aren't allowed.)

Business Agility: Strategies for Gaining Competitive Advantage through Mobile Business Solutions
Business Agility: Strategies for Gaining Competitive Advantage through Mobile Business Solutions
There is little doubt that recent developments in the wireless and information technology industries will have a profound influence on the way business is done. Beyond that, the new “way” is still emerging, and the path to get there is still unclear. These new technologies only have value to the extent that business processes, in their...
Ethics of Big Data: Balancing Risk and Innovation
Ethics of Big Data: Balancing Risk and Innovation

What are your organization’s policies for generating and using huge datasets full of personal information? This book examines ethical questions raised by the big data phenomenon, and explains why enterprises need to reconsider business decisions concerning privacy and identity. Authors Kord Davis and Doug Patterson provide...

The Character of Physical Law (Messenger Lectures, 1964)
The Character of Physical Law (Messenger Lectures, 1964)

In these Messenger Lectures, originally delivered at Cornell University and recorded for television by the BBC, Richard Feynman offers an overview of selected physical laws and gathers their common features into one broad principle of invariance. He maintains at the outset that the importance of a physical law is not "how clever...


Cellular Authentication for Mobile and Internet  Services
Cellular Authentication for Mobile and Internet Services
An invaluable reference discussing the Generic Authentication   Architecture (GAA), its infrastructure, usage and integration into existing networks

Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure...

Physics of Organic Semiconductors
Physics of Organic Semiconductors
"... is a useful contribution to the field and well worth buying." ChemPhysChem

"There is no doubt this book will be a useful companion to current researchers of whichever strand - physicists, chemists, materials scientists, and electrical engineers alike, as well as researchers about to enter the field."
...
Genetic Algorithms: Principles and Perspectives: A Guide to GA Theory (Operations Research/Computer Science Interfaces Series)
Genetic Algorithms: Principles and Perspectives: A Guide to GA Theory (Operations Research/Computer Science Interfaces Series)
Genetic Algorithms: Principles and Perspectives: A Guide to GA Theory is a survey of some important theoretical contributions, many of which have been proposed and developed in the Foundations of Genetic Algorithms series of workshops. However, this theoretical work is still rather fragmented, and the authors believe that...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy