語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Secure wireless sensor networksthrea...
~
Conti, Mauro.
Secure wireless sensor networksthreats and solutions /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Secure wireless sensor networksby Mauro Conti.
其他題名:
threats and solutions /
作者:
Conti, Mauro.
出版者:
New York, NY :Springer New York :2015.
面頁冊數:
xiii, 169 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Wireless sensor networksSecurity measures.
電子資源:
http://dx.doi.org/10.1007/978-1-4939-3460-7
ISBN:
9781493934607$q(electronic bk.)
Secure wireless sensor networksthreats and solutions /
Conti, Mauro.
Secure wireless sensor networks
threats and solutions /[electronic resource] :by Mauro Conti. - New York, NY :Springer New York :2015. - xiii, 169 p. :ill., digital ;24 cm. - Advances in information security,v.651568-2633 ;. - Advances in information security ;12..
Introduction -- Pair-wise key establishment -- Capture Detection -- Clone Detection -- Secure Data Aggregation -- Privacy in Data Aggregation -- Conclusions and Future Works.
This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs) It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone attack. It examines a number of areas and problems to which WSNs are applied continuously, including: supporting rescue operations, building surveillance, fire prevention, battlefield monitoring and more. However, known and unknown threats still affect WSNs and in many applications of this new technology the security of the network is a fundamental issue for confidentiality, integrity, authenticity and availability. The last section of the book addresses security for a common WSN service. Case studies are provided throughout. Secure Wireless Sensor Networks: Threats and Solutions targets advanced-level students and researchers in computer science and electrical engineering as a secondary text book. Professionals working in the wireless sensor networks field will also find this book useful as a reference.
ISBN: 9781493934607$q(electronic bk.)
Standard No.: 10.1007/978-1-4939-3460-7doiSubjects--Topical Terms:
618442
Wireless sensor networks
--Security measures.
LC Class. No.: TK7872.D48
Dewey Class. No.: 004.6
Secure wireless sensor networksthreats and solutions /
LDR
:02330nmm a2200325 a 4500
001
476472
003
DE-He213
005
20160421152954.0
006
m d
007
cr nn 008maaau
008
160526s2015 nyu s 0 eng d
020
$a
9781493934607$q(electronic bk.)
020
$a
9781493934584$q(paper)
024
7
$a
10.1007/978-1-4939-3460-7
$2
doi
035
$a
978-1-4939-3460-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK7872.D48
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
082
0 4
$a
004.6
$2
23
090
$a
TK7872.D48
$b
C762 2015
100
1
$a
Conti, Mauro.
$3
729072
245
1 0
$a
Secure wireless sensor networks
$h
[electronic resource] :
$b
threats and solutions /
$c
by Mauro Conti.
260
$a
New York, NY :
$b
Springer New York :
$b
Imprint: Springer,
$c
2015.
300
$a
xiii, 169 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in information security,
$x
1568-2633 ;
$v
v.65
505
0
$a
Introduction -- Pair-wise key establishment -- Capture Detection -- Clone Detection -- Secure Data Aggregation -- Privacy in Data Aggregation -- Conclusions and Future Works.
520
$a
This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs) It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone attack. It examines a number of areas and problems to which WSNs are applied continuously, including: supporting rescue operations, building surveillance, fire prevention, battlefield monitoring and more. However, known and unknown threats still affect WSNs and in many applications of this new technology the security of the network is a fundamental issue for confidentiality, integrity, authenticity and availability. The last section of the book addresses security for a common WSN service. Case studies are provided throughout. Secure Wireless Sensor Networks: Threats and Solutions targets advanced-level students and researchers in computer science and electrical engineering as a secondary text book. Professionals working in the wireless sensor networks field will also find this book useful as a reference.
650
0
$a
Wireless sensor networks
$x
Security measures.
$3
618442
650
1 4
$a
Computer Science.
$3
212513
650
2 4
$a
Computer Communication Networks.
$3
218087
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Communications Engineering, Networks.
$3
273745
650
2 4
$a
Data Encryption.
$3
273765
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Advances in information security ;
$v
12.
$3
451557
856
4 0
$u
http://dx.doi.org/10.1007/978-1-4939-3460-7
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000119691
電子館藏
1圖書
電子書
EB TK7872.D48 C762 2015
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://dx.doi.org/10.1007/978-1-4939-3460-7
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入