Security in wireless ad hoc and sensor networks:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Chichester
Wiley
2009
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXIII, 257 S. graph. Darst. |
ISBN: | 9780470027486 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035333114 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 090225s2009 d||| |||| 00||| eng d | ||
020 | |a 9780470027486 |c (hbk.) : £65.00 |9 978-0-470-02748-6 | ||
035 | |a (OCoLC)256769504 | ||
035 | |a (DE-599)GBV548154015 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-706 |a DE-634 |a DE-11 |a DE-83 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Çayirci, Erdal |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security in wireless ad hoc and sensor networks |c Erdal Cayirci ; Chunming Rong |
264 | 1 | |a Chichester |b Wiley |c 2009 | |
300 | |a XXIII, 257 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 7 | |a Réseaux ad hoc (informatique) - Mesures de sûreté |2 ram | |
650 | 7 | |a Systèmes de communication sans fil - Mesures de sûreté |2 ram | |
650 | 7 | |a Systèmes informatiques - Mesures de sûreté |2 ram | |
650 | 4 | |a Ad hoc networks (Computer networks) |x Security measures | |
650 | 0 | 7 | |a Ad-hoc-Netz |0 (DE-588)4674811-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Drahtloses Sensorsystem |0 (DE-588)4789222-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Ad-hoc-Netz |0 (DE-588)4674811-8 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Drahtloses Sensorsystem |0 (DE-588)4789222-5 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Rong, Chunming |e Verfasser |4 aut | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017137531&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-017137531 |
Datensatz im Suchindex
_version_ | 1804138646170763264 |
---|---|
adam_text | SECURITY IN WIRELESS AD HOC AND SENSOR NETWORKS ERDAL AYIRCI NATO JOINT
WARFARE CENTRE, NORWAY CHUNMING RONG UNIVERSITY OF STAVANGER, NORWAY
WILEY A JOHN WILEY AND SONS, LTD, PUBLICATION CONTENTS ABOUT THE
AUTHORS XIII PREFACE XV ACKNOWLEDGEMENTS XVII LIST OF ACRONYMS XIX PART
ONE WIRELESS AD HOC, SENSOR AND MESH NETWORKING 1 1 INTRODUCTION 3 1.1
INFORMATION SECURITY 4 1.1.1 COMPUTER SECURITY 4 7.7.2 COMMUNICATIONS
SECURITY 5 1.2 SCOPE OF THE BOOK 5 1.3 STRUCTURE OF THE BOOK 6 1.4
ELECTRONIC RESOURCES FOR THE BOOK 7 1.5 REVIEW QUESTIONS 7 2 WIRELESS AD
HOC, SENSOR AND MESH NETWORKS 9 2.1 AD HOC NETWORKS AND APPLICATIONS 10
2.7.7 APPLICATION EXAMPLES 10 2.7.2 CHALLENGES 11 2.2 SENSOR AND
ACTUATOR NETWORKS 13 2.2.7 APPLICATION EXAMPLES 14 2.2.2 CHALLENGES 15
2.3 MESH NETWORKS 17 2.5.7 APPLICATION EXAMPLES 1 8 2.3.2 CHALLENGES 19
2.4 TACTICAL COMMUNICATIONS AND NETWORKS 19 2.4.1 BLUE FORCE TRACKING
SYSTEM 22 2.5 FACTORS INFLUENCING THE DESIGN OF WIRELESS AD HOC, SENSOR
AND MESH NETWORKS 23 2.5.7 WIRELESS MEDIUM 24 2.5.2 NETWORKING REGIME 25
VLLL CONTENTS 2.5.3 2.5.4 2.5.5 2.5.6 2.5.7 2.5.8 2.5.9 2.5.10 NATURE OF
TRAFFIC QUALITY OF SERVICE REQUIREMENTS MOBILITY FAULT TOLERANCE
OPERATING ENVIRONMENT POWER EFFICIENCY REQUIREMENTS SCALABILITY HARDWARE
REQUIREMENTS AND PRODUCTION COST REVIEW QUESTIONS 26 26 26 27 27 27 27
27 2.6 REVIEW QUESTIONS 28 THE WIRELESS MEDIUM 29 3.1 WIRELESS CHANNEL
FUNDAMENTALS AND SECURITY 29 3.1.1 CAPACITY 31 3.1.2 ELECTROMAGNETIC
SPECTRUM 32 3.1.3 PATH LOSS AND ATTENUATION 35 3.1.4 OTHER TRANSMISSION
IMPAIRMENTS AND JAMMING 36 J.7.5 MODULATION AND DEMODULATION 3 8 3.1.6
MANCHESTER ENCODING 41 3.1.7 MULTIPLEXING AND DUPLEXING 42 3.2 ADVANCED
RADIO TECHNOLOGIES 43 3.2.1 DIRECTIONAL AND SMART ANTENNAS 43 3.2.2
SOFTWARE RADIOS AA 3.2.3 COGNITIVE RADIOS AA 3.2.4
MULTIRADIO/MULTICHANNEL SYSTEMS 45 3.2.5 MIMO SYSTEMS 45 3.3 REVIEW
QUESTIONS 45 MEDIUM ACCESS AND ERROR CONTROL 47 4.1 MEDIUM ACCESS
CONTROL 47 4.1.1 GENERIC MAC PROTOCOLS 47 4.1.2 MAC PROTOCOLS FOR
WIRELESS AD HOC, SENSOR AND MESH NETWORKS 51 4.2 ERROR CONTROL 53 4.2.1
ERROR CORRECTION 54 4.2.2 ERROR DETECTION 56 4.3 WIRELESS METROPOLITAN
AREA NETWORKS 58 4.3.1 IEEE 802.16 58 4.3.2 WIMAX 58 4.4 WIRELESS LOCAL
AREA NETWORKS 59 4.4.1 IEEE802.IL 59 4.4.2 WI-FI 60 4.5 WIRELESS
PERSONAL AREA NETWORKS 60 4.5.1 IEEE 802.15.1 60 4.5.2 BLUETOOTH 61
4.5.3 IEEE 802.15.4 62 CONTENTS IX 4.5.4 ZIGBEE 62 4.5.5 WIMEDIA 63 4.6
REVIEW QUESTIONS 64 5 ROUTING 65 5.1 INTERNET PROTOCOL AND MOBILE IP 65
5.1.1 IPV4, IPV6 AND SECURITY IN IP 65 5. 1.2 DISTANCE VECTOR AND LINK
STATE ALGORITHMS 68 5.1.3 INTERNETWORKING 70 5.1.4 MULTICASTING,
GEOCASTING, ANY CASTING AND BROADCASTING 1 1 5.7.5 MOBILE IP 71 5.2
ROUTING IN WIRELESS AD HOC NETWORKS 72 5.2.7 FLOODING AND GOSSIPING 73
5.2.2 AD HOC ON-DEMAND DISTANCE VECTOR ROUTING (AODV) 73 5.2.3 DYNAMIC
SOURCE ROUTING 74 5.3 ROUTING IN WIRELESS SENSOR AND ACTUATOR NETWORKS
75 5.3.1 DIRECTED DIFFUSION 75 5. 3.2 SENSOR PROTOCOLS FOR INFORMATION
VIA NEGOTIATION (SPIN) 76 5.3.3 LOW-ENERGY ADAPTIVE CLUSTERING HIERARCHY
(LEACH) 76 5.3.4 POWER-AWARE MANY-TO-MANY ROUTING (PAMR) 11 5.4 REVIEW
QUESTIONS 79 6 RELIABILITY, FLOW AND CONGESTION CONTROL 81 6.1
RELIABILITY 81 6.7.7 N ON-ACKNOWLEDGEMENT-BASED SCHEMES 8 3 6.7.2
ACKNOWLEDGEMENT-BASED SCHEMES 84 6.2 FLOW AND CONGESTION CONTROL 85 6.3
REVIEW QUESTIONS 88 7 OTHER CHALLENGES AND SECURITY ASPECTS 89 7.1
LOCALIZATION AND POSITIONING 89 7.2 TIME SYNCHRONIZATION 93 7.3
ADDRESSING 95 7.4 DATA AGGREGATION AND FUSION 96 7.5 DATA QUERYING 97
7.5.7 DATABASE APPROACH 97 7.5.2 TASK SETS 99 7.5.3 OTHER DATA-QUERYING
SCHEMES 99 7.6 COVERAGE 100 7.7 MOBILITY MANAGEMENT 101 7.8 CROSS-LAYER
DESIGN 102 7.9 REVIEW QUESTIONS 103 X CONTENTS PART TWO SECURITY IN
WIRELESS AD HOC, SENSOR AND MESH NETWORKING 105 8 SECURITY ATTACKS IN AD
HOC, SENSOR AND MESH NETWORKS 107 8.1 SECURITY ATTACKS 107 8.1.1 PASSIVE
ATTACKS 107 8.1.2 ACTIVE ATTACKS 109 8.2 ATTACKERS 117 8.3 SECURITY
GOALS 119 8.4 REVIEW QUESTIONS 119 9 CRYPTOGRAPHY 121 9.1 SYMMETRIC
ENCRYPTION 121 9.2 ASYMMETRIC ENCRYPTION 127 9.3 HASH FUNCTIONS AND
MESSAGE AUTHENTICATION CODE 131 9.4 CASCADING HASHING 136 9.4.1 HASH
CHAINS 137 9.4.2 HASH TREES 137 9.4.3 TESLA 138 9.5 REVIEW QUESTIONS 140
10 CHALLENGES AND SOLUTIONS: BASIC ISSUES 143 10.1 BOOTSTRAPPING
SECURITY IN AD HOC NETWORKS 144 10.2 BOOTSTRAPPING SECURITY IN SENSOR
NETWORKS 145 10.3 KEY DISTRIBUTION, EXCHANGE AND MANAGEMENT 146 10.3.1
STANDARDS 147 10.3.2 CLASSIFICATION OF KEY MANAGEMENT SCHEMES 147 10.3.3
CONTRIBUTORY SCHEMES 148 10.3.4 DISTRIBUTIVE SCHEMES 153 10.4
AUTHENTICATION ISSUES 171 10.5 INTEGRITY 171 10.6 REVIEW QUESTIONS 172
11 CHALLENGES AND SOLUTIONS: PROTECTION 173 11.1 PRIVACY AND ANONYMITY
173 11.2 INTRUSION DETECTION 174 11.2.1 ARCHITECTURES FOR IDS IN
WIRELESS AD HOC NETWORKS 175 11.3 DEFENSE AGAINST TRAFFIC ANALYSIS 177
11.4 ACCESS CONTROL AND SECURE HUMAN-COMPUTER INTERACTION 177 11.5
SOFTWARE-BASED ANTI-TAMPER TECHNIQUES 179 11.5.1 ENCRYPTION WRAPPERS 180
11.5.2 CODE OBFUSCATION 181 11.5.3 SOFTWARE WATERMARKING AND
FINGERPRINTING 181 11.5.4 GUARDING 182 11.6 TAMPER RESILIENCE: HARDWARE
PROTECTION 183 11.7 AVAILABILITY AND PLAUSIBILITY 184 11.8 REVIEW
QUESTIONS 185 CONTENTS XI 12 SECURE ROUTING 187 12.1 DEFENSE AGAINST
SECURITY ATTACKS IN AD HOC ROUTING 187 12.1.1 TECHNIQUES AGAINST
WORMHOLE ATTACKS 188 12.1.2 TECHNIQUES AGAINST SYBIL ATTACKS 189 12.1.3
TECHNIQUES AGAINST SELECTIVE FORWARDING 189 12.1.4 SECURE ROUTING IN
SENSOR NETWORKS 190 12.1.5 ROUTING SCHEMES THAT ENHANCE SECURITY 191
12.2 SECURE AD HOC ROUTING PROTOCOLS 192 12.2.1 INTRUSION-TOLERANT
ROUTING IN WIRELESS SENSOR NETWORKS (INSENS) 193 12.2.2 AUTHENTICATED
ROUTING FOR AD HOC NETWORKING (ARAN) 195 12.2.3 ON-DEMAND SECURE AD HOC
ROUTING (ARIADNE) 197 12.2.4 WATCHDOG PATHRATER 199 12.2.5 SECURE AD HOC
ON-DEMAND DISTANCE VECTOR (SAODV) 199 12.2.6 SECURE LINK STATE ROUTING
PROTOCOL (SLSP) 200 12.3 FURTHER READING 201 12.4 REVIEW QUESTIONS 202
13 SPECIFIC CHALLENGES AND SOLUTIONS 203 13.1 SPINS: SECURITY PROTOCOLS
FOR SENSOR NETWORKS 203 13.1.1 SNEP 204 13.1.2 SSTESLA 205 13.2
QUARANTINE REGION SCHEME FOR SPAM ATTACKS 205 13.3 SECURE CHARGING AND
REWARDING SCHEME 209 13.3.1 ESTABLISHING A SESSION 210 13.3.2 PACKET
DELIVERY 2 11 13.3.3 ACKNOWLEDGING DELIVERY 212 13.3.4 TERMINATING A
SESSION 212 13.4 SECURE NODE LOCALIZATION 213 13.4.1 DETECTION OF
MALICIOUS BEACON NODES AND REPLAYED BEACON SIGNALS 213 13.4.2
ATTACK-RESISTANT LOCATION ESTIMATION 215 13.5 SECURE TIME
SYNCHRONIZATION 216 13.6 SECURE EVENT AND EVENT BOUNDARY DETECTION 217
13.6.1 STAGE 1: DETECTION OF FAULTY NODES 217 13.6.2 STAGE 2: DETECTION
OF EVENT BOUNDARY NODES 219 13.6.3 STAGE 3: IMPROVEMENT OF EVENT
BOUNDARY NODE DETECTION 220 13.7 REVIEW QUESTIONS 220 14 INFORMATION
OPERATIONS AND ELECTRONIC WARFARE 221 14.1 ELECTRONIC SUPPORT 223 14.2
ELECTRONIC ATTACK 224 14.3 ELECTRONIC PROTECTION 225 14.4 PREVIEW
QUESTIONS 225 XLL CONTENTS 15 STANDARDS 227~ 15.1 X.800 AND RFC 2828 227
15.1.1 SECURITY THREATS AND ATTACKS 227 15.1.2 SECURITY SERVICES 228
15.1.3 SECURITY MECHANISMS 230 15.1.4 RELATIONSHIPS BETWEEN SECURITY
SERVICES AND MECHANISMS 23 1 15.1.5 PLACEMENTS OF SECURITY SERVICES AND
MECHANISMS 231 15.2 WIRED EQUIVALENT PRIVACY (WEP) 231 15.2.1 HOW DOES
WEP WORK? 231 15.2.2 WEP WEAKNESSES 236 15.3 WI-FI PROTECTED ACCESS
(WPA) 239 15.3.1 HOW DOES WPA WORK? 239 15.3.2 WEP AND WPA COMPARISON
242 15.3.3 WPA2 242 REFERENCES 245 INDEX 253
|
any_adam_object | 1 |
author | Çayirci, Erdal Rong, Chunming |
author_facet | Çayirci, Erdal Rong, Chunming |
author_role | aut aut |
author_sort | Çayirci, Erdal |
author_variant | e ç eç c r cr |
building | Verbundindex |
bvnumber | BV035333114 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)256769504 (DE-599)GBV548154015 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01939nam a2200469 c 4500</leader><controlfield tag="001">BV035333114</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090225s2009 d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470027486</subfield><subfield code="c">(hbk.) : £65.00</subfield><subfield code="9">978-0-470-02748-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)256769504</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV548154015</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Çayirci, Erdal</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in wireless ad hoc and sensor networks</subfield><subfield code="c">Erdal Cayirci ; Chunming Rong</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chichester</subfield><subfield code="b">Wiley</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIII, 257 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Réseaux ad hoc (informatique) - Mesures de sûreté</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Systèmes de communication sans fil - Mesures de sûreté</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Systèmes informatiques - Mesures de sûreté</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ad hoc networks (Computer networks)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ad-hoc-Netz</subfield><subfield code="0">(DE-588)4674811-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses Sensorsystem</subfield><subfield code="0">(DE-588)4789222-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Ad-hoc-Netz</subfield><subfield code="0">(DE-588)4674811-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Drahtloses Sensorsystem</subfield><subfield code="0">(DE-588)4789222-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rong, Chunming</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017137531&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017137531</subfield></datafield></record></collection> |
id | DE-604.BV035333114 |
illustrated | Illustrated |
indexdate | 2024-07-09T21:31:30Z |
institution | BVB |
isbn | 9780470027486 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017137531 |
oclc_num | 256769504 |
open_access_boolean | |
owner | DE-573 DE-706 DE-634 DE-11 DE-83 |
owner_facet | DE-573 DE-706 DE-634 DE-11 DE-83 |
physical | XXIII, 257 S. graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Wiley |
record_format | marc |
spelling | Çayirci, Erdal Verfasser aut Security in wireless ad hoc and sensor networks Erdal Cayirci ; Chunming Rong Chichester Wiley 2009 XXIII, 257 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Réseaux ad hoc (informatique) - Mesures de sûreté ram Systèmes de communication sans fil - Mesures de sûreté ram Systèmes informatiques - Mesures de sûreté ram Ad hoc networks (Computer networks) Security measures Ad-hoc-Netz (DE-588)4674811-8 gnd rswk-swf Drahtloses Sensorsystem (DE-588)4789222-5 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Ad-hoc-Netz (DE-588)4674811-8 s Computersicherheit (DE-588)4274324-2 s DE-604 Drahtloses Sensorsystem (DE-588)4789222-5 s Rong, Chunming Verfasser aut GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017137531&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Çayirci, Erdal Rong, Chunming Security in wireless ad hoc and sensor networks Réseaux ad hoc (informatique) - Mesures de sûreté ram Systèmes de communication sans fil - Mesures de sûreté ram Systèmes informatiques - Mesures de sûreté ram Ad hoc networks (Computer networks) Security measures Ad-hoc-Netz (DE-588)4674811-8 gnd Drahtloses Sensorsystem (DE-588)4789222-5 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4674811-8 (DE-588)4789222-5 (DE-588)4274324-2 |
title | Security in wireless ad hoc and sensor networks |
title_auth | Security in wireless ad hoc and sensor networks |
title_exact_search | Security in wireless ad hoc and sensor networks |
title_full | Security in wireless ad hoc and sensor networks Erdal Cayirci ; Chunming Rong |
title_fullStr | Security in wireless ad hoc and sensor networks Erdal Cayirci ; Chunming Rong |
title_full_unstemmed | Security in wireless ad hoc and sensor networks Erdal Cayirci ; Chunming Rong |
title_short | Security in wireless ad hoc and sensor networks |
title_sort | security in wireless ad hoc and sensor networks |
topic | Réseaux ad hoc (informatique) - Mesures de sûreté ram Systèmes de communication sans fil - Mesures de sûreté ram Systèmes informatiques - Mesures de sûreté ram Ad hoc networks (Computer networks) Security measures Ad-hoc-Netz (DE-588)4674811-8 gnd Drahtloses Sensorsystem (DE-588)4789222-5 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Réseaux ad hoc (informatique) - Mesures de sûreté Systèmes de communication sans fil - Mesures de sûreté Systèmes informatiques - Mesures de sûreté Ad hoc networks (Computer networks) Security measures Ad-hoc-Netz Drahtloses Sensorsystem Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017137531&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT cayircierdal securityinwirelessadhocandsensornetworks AT rongchunming securityinwirelessadhocandsensornetworks |