From problem toward solution: wireless sensor networks security
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
New York
Nova Science Publishers
c2009
|
Schriftenreihe: | Distributed, cluster, and grid computing
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references and index Preserving data authenticity in wireless sensor networks: attacks and countermeasures / Fan Ye ... [et al.] -- Location tracking attack in ad hoc networks based on topology information / Boto Bako ... [et al.] -- Prevention of DOS attack in sensor networks using repeated game theory / Afrand Agah, Mehran Asadi and Sajal K. Das -- Impact of packet injection models on misbehavior detection performance in wireless sensor networks / Sven Schaust, Martin Drozda and Helena Szczerbicka -- Security aware routing in hierarchical optical sensor networks / Unoma Ndili Okorafor and Deepa Kundur -- Secure multi-path data delivery in sensor networks / Dijiang Huang -- SELOC: secure localization for wireless sensor and actor network / Jianqing Ma, Shiyong Zhang and Xiaowen Tong -- Security in wireless sensor networks: a formal approach / Llanos Tobarra, Diego Cazorlas and Fernando Cuartero -- - C4W: an energy efficient public key cryptosystem for large-scale wireless sensor networks / Qi Jing, Joanbin Hu and Zhong Chen -- Energy consumption of security algorithms in wireless sensor nodes / Chih-Chun Chang, David J. Nagel and Sead Muftic -- Deterministic and randomized key pre-distribution schemes for mobile ad-hoc networks: foundations and example constructions / Effie Makri and Yannis C. Stamatiou -- ARPD: asynchronous random key predistribution in the leap framework for wireless sensor networks / Andreas Achtzehn, Christian Rohner and Ionna Rodhe -- Secure k-connectivity properties of wireless sensor networks / Yee Wei Law ... [et al.] -- Gateway subset difference revocation / Jeffrey Opper, Brian DeCleene and May Leung -- Authenticated key exchange with group support for wireless sensor networks / Petr Švenda and Václav Matyáš -- Tradeoff between key-exchange frequency and network lifetime for interconnected IEEE 802.15.4 beacon enabled clusters Jelena Mišić -- - Secure access control for location-based applications in WLAN systems / YounSun Cho, Michael Goodrich and Lichun Bao -- Practical user access control in sensor networks / HaodongWang and Qun Li |
Beschreibung: | 1 Online-Ressource (xii, 382 p.) |
ISBN: | 1604564571 160456458X 1612097324 9781604564570 9781604564587 9781612097329 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043136652 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2009 |||| o||u| ||||||eng d | ||
020 | |a 1604564571 |9 1-60456-457-1 | ||
020 | |a 160456458X |9 1-60456-458-X | ||
020 | |a 1612097324 |c electronic bk. |9 1-61209-732-4 | ||
020 | |a 9781604564570 |9 978-1-60456-457-0 | ||
020 | |a 9781604564587 |9 978-1-60456-458-7 | ||
020 | |a 9781612097329 |c electronic bk. |9 978-1-61209-732-9 | ||
035 | |a (OCoLC)694792705 | ||
035 | |a (DE-599)BVBBV043136652 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 681/.25 |2 22 | |
245 | 1 | 0 | |a From problem toward solution |b wireless sensor networks security |c Zhen Jiang and Yi Pan, editors |
264 | 1 | |a New York |b Nova Science Publishers |c c2009 | |
300 | |a 1 Online-Ressource (xii, 382 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Distributed, cluster, and grid computing | |
500 | |a Includes bibliographical references and index | ||
500 | |a Preserving data authenticity in wireless sensor networks: attacks and countermeasures / Fan Ye ... [et al.] -- Location tracking attack in ad hoc networks based on topology information / Boto Bako ... [et al.] -- Prevention of DOS attack in sensor networks using repeated game theory / Afrand Agah, Mehran Asadi and Sajal K. Das -- Impact of packet injection models on misbehavior detection performance in wireless sensor networks / Sven Schaust, Martin Drozda and Helena Szczerbicka -- Security aware routing in hierarchical optical sensor networks / Unoma Ndili Okorafor and Deepa Kundur -- Secure multi-path data delivery in sensor networks / Dijiang Huang -- SELOC: secure localization for wireless sensor and actor network / Jianqing Ma, Shiyong Zhang and Xiaowen Tong -- Security in wireless sensor networks: a formal approach / Llanos Tobarra, Diego Cazorlas and Fernando Cuartero -- | ||
500 | |a - C4W: an energy efficient public key cryptosystem for large-scale wireless sensor networks / Qi Jing, Joanbin Hu and Zhong Chen -- Energy consumption of security algorithms in wireless sensor nodes / Chih-Chun Chang, David J. Nagel and Sead Muftic -- Deterministic and randomized key pre-distribution schemes for mobile ad-hoc networks: foundations and example constructions / Effie Makri and Yannis C. Stamatiou -- ARPD: asynchronous random key predistribution in the leap framework for wireless sensor networks / Andreas Achtzehn, Christian Rohner and Ionna Rodhe -- Secure k-connectivity properties of wireless sensor networks / Yee Wei Law ... [et al.] -- Gateway subset difference revocation / Jeffrey Opper, Brian DeCleene and May Leung -- Authenticated key exchange with group support for wireless sensor networks / Petr Švenda and Václav Matyáš -- Tradeoff between key-exchange frequency and network lifetime for interconnected IEEE 802.15.4 beacon enabled clusters Jelena Mišić -- | ||
500 | |a - Secure access control for location-based applications in WLAN systems / YounSun Cho, Michael Goodrich and Lichun Bao -- Practical user access control in sensor networks / HaodongWang and Qun Li | ||
650 | 7 | |a TECHNOLOGY & ENGINEERING / Sensors |2 bisacsh | |
650 | 4 | |a Sensor networks |x Security measures | |
650 | 4 | |a Wireless LANs |x Security measures | |
650 | 4 | |a Wireless metropolitan area networks |x Security measures | |
650 | 4 | |a Ad hoc networks (Computer networks) |x Security measures | |
700 | 1 | |a Jiang, Zhen |e Sonstige |4 oth | |
700 | 1 | |a Pan, Yi |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=350622 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028560843 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=350622 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=350622 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175581293576192 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043136652 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)694792705 (DE-599)BVBBV043136652 |
dewey-full | 681/.25 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 681 - Precision instruments and other devices |
dewey-raw | 681/.25 |
dewey-search | 681/.25 |
dewey-sort | 3681 225 |
dewey-tens | 680 - Manufacture of products for specific uses |
discipline | Handwerk und Gewerbe / Verschiedene Technologien |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04147nmm a2200505zc 4500</leader><controlfield tag="001">BV043136652</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1604564571</subfield><subfield code="9">1-60456-457-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">160456458X</subfield><subfield code="9">1-60456-458-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1612097324</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-61209-732-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781604564570</subfield><subfield code="9">978-1-60456-457-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781604564587</subfield><subfield code="9">978-1-60456-458-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781612097329</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-61209-732-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)694792705</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043136652</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">681/.25</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">From problem toward solution</subfield><subfield code="b">wireless sensor networks security</subfield><subfield code="c">Zhen Jiang and Yi Pan, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Nova Science Publishers</subfield><subfield code="c">c2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 382 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Distributed, cluster, and grid computing</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Preserving data authenticity in wireless sensor networks: attacks and countermeasures / Fan Ye ... [et al.] -- Location tracking attack in ad hoc networks based on topology information / Boto Bako ... [et al.] -- Prevention of DOS attack in sensor networks using repeated game theory / Afrand Agah, Mehran Asadi and Sajal K. Das -- Impact of packet injection models on misbehavior detection performance in wireless sensor networks / Sven Schaust, Martin Drozda and Helena Szczerbicka -- Security aware routing in hierarchical optical sensor networks / Unoma Ndili Okorafor and Deepa Kundur -- Secure multi-path data delivery in sensor networks / Dijiang Huang -- SELOC: secure localization for wireless sensor and actor network / Jianqing Ma, Shiyong Zhang and Xiaowen Tong -- Security in wireless sensor networks: a formal approach / Llanos Tobarra, Diego Cazorlas and Fernando Cuartero -- </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - C4W: an energy efficient public key cryptosystem for large-scale wireless sensor networks / Qi Jing, Joanbin Hu and Zhong Chen -- Energy consumption of security algorithms in wireless sensor nodes / Chih-Chun Chang, David J. Nagel and Sead Muftic -- Deterministic and randomized key pre-distribution schemes for mobile ad-hoc networks: foundations and example constructions / Effie Makri and Yannis C. Stamatiou -- ARPD: asynchronous random key predistribution in the leap framework for wireless sensor networks / Andreas Achtzehn, Christian Rohner and Ionna Rodhe -- Secure k-connectivity properties of wireless sensor networks / Yee Wei Law ... [et al.] -- Gateway subset difference revocation / Jeffrey Opper, Brian DeCleene and May Leung -- Authenticated key exchange with group support for wireless sensor networks / Petr Švenda and Václav Matyáš -- Tradeoff between key-exchange frequency and network lifetime for interconnected IEEE 802.15.4 beacon enabled clusters Jelena Mišić -- </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - Secure access control for location-based applications in WLAN systems / YounSun Cho, Michael Goodrich and Lichun Bao -- Practical user access control in sensor networks / HaodongWang and Qun Li</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Sensors</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sensor networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless LANs</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless metropolitan area networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ad hoc networks (Computer networks)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jiang, Zhen</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pan, Yi</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=350622</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028560843</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=350622</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=350622</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043136652 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:34Z |
institution | BVB |
isbn | 1604564571 160456458X 1612097324 9781604564570 9781604564587 9781612097329 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028560843 |
oclc_num | 694792705 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xii, 382 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Nova Science Publishers |
record_format | marc |
series2 | Distributed, cluster, and grid computing |
spelling | From problem toward solution wireless sensor networks security Zhen Jiang and Yi Pan, editors New York Nova Science Publishers c2009 1 Online-Ressource (xii, 382 p.) txt rdacontent c rdamedia cr rdacarrier Distributed, cluster, and grid computing Includes bibliographical references and index Preserving data authenticity in wireless sensor networks: attacks and countermeasures / Fan Ye ... [et al.] -- Location tracking attack in ad hoc networks based on topology information / Boto Bako ... [et al.] -- Prevention of DOS attack in sensor networks using repeated game theory / Afrand Agah, Mehran Asadi and Sajal K. Das -- Impact of packet injection models on misbehavior detection performance in wireless sensor networks / Sven Schaust, Martin Drozda and Helena Szczerbicka -- Security aware routing in hierarchical optical sensor networks / Unoma Ndili Okorafor and Deepa Kundur -- Secure multi-path data delivery in sensor networks / Dijiang Huang -- SELOC: secure localization for wireless sensor and actor network / Jianqing Ma, Shiyong Zhang and Xiaowen Tong -- Security in wireless sensor networks: a formal approach / Llanos Tobarra, Diego Cazorlas and Fernando Cuartero -- - C4W: an energy efficient public key cryptosystem for large-scale wireless sensor networks / Qi Jing, Joanbin Hu and Zhong Chen -- Energy consumption of security algorithms in wireless sensor nodes / Chih-Chun Chang, David J. Nagel and Sead Muftic -- Deterministic and randomized key pre-distribution schemes for mobile ad-hoc networks: foundations and example constructions / Effie Makri and Yannis C. Stamatiou -- ARPD: asynchronous random key predistribution in the leap framework for wireless sensor networks / Andreas Achtzehn, Christian Rohner and Ionna Rodhe -- Secure k-connectivity properties of wireless sensor networks / Yee Wei Law ... [et al.] -- Gateway subset difference revocation / Jeffrey Opper, Brian DeCleene and May Leung -- Authenticated key exchange with group support for wireless sensor networks / Petr Švenda and Václav Matyáš -- Tradeoff between key-exchange frequency and network lifetime for interconnected IEEE 802.15.4 beacon enabled clusters Jelena Mišić -- - Secure access control for location-based applications in WLAN systems / YounSun Cho, Michael Goodrich and Lichun Bao -- Practical user access control in sensor networks / HaodongWang and Qun Li TECHNOLOGY & ENGINEERING / Sensors bisacsh Sensor networks Security measures Wireless LANs Security measures Wireless metropolitan area networks Security measures Ad hoc networks (Computer networks) Security measures Jiang, Zhen Sonstige oth Pan, Yi Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=350622 Aggregator Volltext |
spellingShingle | From problem toward solution wireless sensor networks security TECHNOLOGY & ENGINEERING / Sensors bisacsh Sensor networks Security measures Wireless LANs Security measures Wireless metropolitan area networks Security measures Ad hoc networks (Computer networks) Security measures |
title | From problem toward solution wireless sensor networks security |
title_auth | From problem toward solution wireless sensor networks security |
title_exact_search | From problem toward solution wireless sensor networks security |
title_full | From problem toward solution wireless sensor networks security Zhen Jiang and Yi Pan, editors |
title_fullStr | From problem toward solution wireless sensor networks security Zhen Jiang and Yi Pan, editors |
title_full_unstemmed | From problem toward solution wireless sensor networks security Zhen Jiang and Yi Pan, editors |
title_short | From problem toward solution |
title_sort | from problem toward solution wireless sensor networks security |
title_sub | wireless sensor networks security |
topic | TECHNOLOGY & ENGINEERING / Sensors bisacsh Sensor networks Security measures Wireless LANs Security measures Wireless metropolitan area networks Security measures Ad hoc networks (Computer networks) Security measures |
topic_facet | TECHNOLOGY & ENGINEERING / Sensors Sensor networks Security measures Wireless LANs Security measures Wireless metropolitan area networks Security measures Ad hoc networks (Computer networks) Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=350622 |
work_keys_str_mv | AT jiangzhen fromproblemtowardsolutionwirelesssensornetworkssecurity AT panyi fromproblemtowardsolutionwirelesssensornetworkssecurity |