Developing security tools of WSN and WBAN networks applications:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Tokyo [u.a.]
Springer
2015
|
Schriftenreihe: | Lecture notes in electrical engineering
316 |
Schlagworte: | |
Online-Zugang: | BHS01 BTU01 FAB01 FAW01 FHA01 FHI01 FHN01 FHR01 FKE01 FRO01 FWS01 FWS02 UBY01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9784431550693 |
DOI: | 10.1007/978-4-431-55069-3 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV042261141 | ||
003 | DE-604 | ||
005 | 20160315 | ||
007 | cr|uuu---uuuuu | ||
008 | 150109s2015 |||| o||u| ||||||eng d | ||
020 | |a 9784431550693 |c Online |9 978-4-431-55069-3 | ||
024 | 7 | |a 10.1007/978-4-431-55069-3 |2 doi | |
035 | |a (OCoLC)897581570 | ||
035 | |a (DE-599)BSZ420332731 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-634 |a DE-Aug4 |a DE-1043 |a DE-1046 |a DE-859 |a DE-92 |a DE-898 |a DE-863 |a DE-862 |a DE-573 |a DE-B768 |a DE-861 |a DE-706 | ||
050 | 0 | |a TK1-9971 | |
082 | 0 | |a 621.382 | |
100 | 1 | |a El-Bendary, Mohsen A. M. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Developing security tools of WSN and WBAN networks applications |c Mohsen A. M. El-Bendary |
264 | 1 | |a Tokyo [u.a.] |b Springer |c 2015 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in electrical engineering |v 316 | |
650 | 4 | |a Ingenieurwissenschaften | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Telecommunication | |
650 | 4 | |a Systems engineering | |
650 | 4 | |a Engineering | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-4-431-55068-6 |
830 | 0 | |a Lecture notes in electrical engineering |v 316 |w (DE-604)BV042385829 |9 316 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-4-431-55069-3 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027698913&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027698913&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-ENG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027698913 | ||
966 | e | |u https://doi.org/10.1007/978-4-431-55069-3 |l BHS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-4-431-55069-3 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-4-431-55069-3 |l FAB01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-4-431-55069-3 |l FAW01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-4-431-55069-3 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-4-431-55069-3 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-4-431-55069-3 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-4-431-55069-3 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-4-431-55069-3 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-4-431-55069-3 |l FRO01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-4-431-55069-3 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-4-431-55069-3 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-4-431-55069-3 |l UBY01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 541431 |
---|---|
_version_ | 1806179182636433408 |
adam_text | DEVELOPING SECURITY TOOLS OF WSN AND WBAN NETWORKS APPLICATIONS
/ A. M. EL-BENDARY, MOHSEN
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION
WIRELESS NETWORK OVERVIEW
SENSING NETWORKS
WSN OVERVIEW
WBAN OVERVIEW
WSN AND EMBEDDING SYSTEM RELATION
WIRELESS SENSING NETWORKS CONTENTS
.WIRELESS, MOBILE, AND AD-HOC NETWORKS
.BOOK ORGANIZING
. SENSING AND ENVIRONMENT CONCEPTS
INTRODUCTION
SENSING DEFINITION
ENVIRONMENT CONCEPTS
WSN AND ENVIRONMENT
ENVIRONMENT AND MEDICAL CARE CONCERNS
WSNS AND SENSORS
SENSING EXAMPLES
WIRELESS NETWORKS
INTRODUCTION
LOW-RATE WIRELESS NETWORKS
BLUETOOTH NETWORKS ARCHITECTURE
ADAPTIVE PACKETS OF WPAN TECHNOLOGY
THROUGHPUT STUDY OF LOW-RATE COMMUNICATIONS
INTRODUCTION
RELATED WORK
THROUGHPUT DEFINITION OF WSN AND WBAN
ANALYSIS OF PEP
THE PROPOSED SCENARIOS
SIMULATION ASSUMPTIONS
SIMULATION RESULTS
CHAPTER RECOMMENDATION
WSN SECURITY NEEDS
INTRODUCTION
SECURITY GOALS
FUNDAMENTALS OF NETWORK SECURITY
CHALLENGES OF WSN SECURITY
WSN IMPLEMENTATION TECHNOLOGIES
SUMMARY
LOWER COMPLEXITY OF SECURED WSN NETWORKS
POWER WITH FEC
COMPLEXITY FEC DEPENDANT
INTERLEAVING TECHNIQUES
INTERLEAVERS INVESTIGATION
CHAOTIC INTERLEAVER STRUCTURE
CRYPTOGRAPHY USING CHAOS
OBJECTIVE QUALITY METRICS
JAKES METHOD
MOBILITY EFFECTS
COOPERATIVE ALGORITHM OF WSN
APPENDIXES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
DEVELOPING SECURITY TOOLS OF WSN AND WBAN NETWORKS APPLICATIONS
/ A. M. EL-BENDARY, MOHSEN
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK FOCUSES ON TWO OF THE MOST RAPIDLY DEVELOPING AREAS IN
WIRELESS TECHNOLOGY (WT) APPLICATIONS, NAMELY, WIRELESS SENSORS NETWORKS
(WSNS) AND WIRELESS BODY AREA NETWORKS (WBANS). THESE NETWORKS CAN BE
CONSIDERED SMART APPLICATIONS OF THE RECENT WT REVOLUTIONS. THE BOOK
PRESENTS VARIOUS SECURITY TOOLS AND SCENARIOS FOR THE PROPOSED
ENHANCED-SECURITY OF WSNS, WHICH ARE SUPPLEMENTED WITH NUMEROUS COMPUTER
SIMULATIONS. IN THE COMPUTER SIMULATION SECTION, WSN MODELING IS
ADDRESSED USING MATLAB PROGRAMMING LANGUAGE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | El-Bendary, Mohsen A. M. |
author_facet | El-Bendary, Mohsen A. M. |
author_role | aut |
author_sort | El-Bendary, Mohsen A. M. |
author_variant | m a m e b mame mameb |
building | Verbundindex |
bvnumber | BV042261141 |
callnumber-first | T - Technology |
callnumber-label | TK1-9971 |
callnumber-raw | TK1-9971 |
callnumber-search | TK1-9971 |
callnumber-sort | TK 11 49971 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)897581570 (DE-599)BSZ420332731 |
dewey-full | 621.382 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 |
dewey-search | 621.382 |
dewey-sort | 3621.382 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
doi_str_mv | 10.1007/978-4-431-55069-3 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03185nmm a2200589 cb4500</leader><controlfield tag="001">BV042261141</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160315 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150109s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9784431550693</subfield><subfield code="c">Online</subfield><subfield code="9">978-4-431-55069-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-4-431-55069-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)897581570</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ420332731</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-B768</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK1-9971</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">El-Bendary, Mohsen A. M.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Developing security tools of WSN and WBAN networks applications</subfield><subfield code="c">Mohsen A. M. El-Bendary</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Tokyo [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in electrical engineering</subfield><subfield code="v">316</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-4-431-55068-6</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in electrical engineering</subfield><subfield code="v">316</subfield><subfield code="w">(DE-604)BV042385829</subfield><subfield code="9">316</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-4-431-55069-3</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027698913&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027698913&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027698913</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-4-431-55069-3</subfield><subfield code="l">BHS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-4-431-55069-3</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-4-431-55069-3</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-4-431-55069-3</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-4-431-55069-3</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-4-431-55069-3</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-4-431-55069-3</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-4-431-55069-3</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-4-431-55069-3</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-4-431-55069-3</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-4-431-55069-3</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-4-431-55069-3</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-4-431-55069-3</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042261141 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T12:04:56Z |
institution | BVB |
isbn | 9784431550693 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027698913 |
oclc_num | 897581570 |
open_access_boolean | |
owner | DE-634 DE-Aug4 DE-1043 DE-1046 DE-859 DE-92 DE-898 DE-BY-UBR DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-573 DE-B768 DE-861 DE-706 |
owner_facet | DE-634 DE-Aug4 DE-1043 DE-1046 DE-859 DE-92 DE-898 DE-BY-UBR DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-573 DE-B768 DE-861 DE-706 |
physical | 1 Online-Ressource |
psigel | ZDB-2-ENG |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Lecture notes in electrical engineering |
series2 | Lecture notes in electrical engineering |
spellingShingle | El-Bendary, Mohsen A. M. Developing security tools of WSN and WBAN networks applications Lecture notes in electrical engineering Ingenieurwissenschaften Computer Communication Networks Telecommunication Systems engineering Engineering |
title | Developing security tools of WSN and WBAN networks applications |
title_auth | Developing security tools of WSN and WBAN networks applications |
title_exact_search | Developing security tools of WSN and WBAN networks applications |
title_full | Developing security tools of WSN and WBAN networks applications Mohsen A. M. El-Bendary |
title_fullStr | Developing security tools of WSN and WBAN networks applications Mohsen A. M. El-Bendary |
title_full_unstemmed | Developing security tools of WSN and WBAN networks applications Mohsen A. M. El-Bendary |
title_short | Developing security tools of WSN and WBAN networks applications |
title_sort | developing security tools of wsn and wban networks applications |
topic | Ingenieurwissenschaften Computer Communication Networks Telecommunication Systems engineering Engineering |
topic_facet | Ingenieurwissenschaften Computer Communication Networks Telecommunication Systems engineering Engineering |
url | https://doi.org/10.1007/978-4-431-55069-3 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027698913&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027698913&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV042385829 |
work_keys_str_mv | AT elbendarymohsenam developingsecuritytoolsofwsnandwbannetworksapplications |