Wireless sensor network security:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Amsterdam
IOS Press
©2008
|
Schriftenreihe: | Cryptology and information security series
v. 1 |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references and index Title page; Contents; Overview of Wireless Sensor Network Security; Vulnerabilities and Attacks in Wireless Sensor Networks; Symmetric Primitives; Public-Key Primitives; Key Management in Wireless Sensor Networks; WSN Link-Layer Security Frameworks; Secure Routing in Wireless Sensor Networks; Secure Data Aggregation in Wireless Sensor Networks; Privacy Protection Mechanisms for Sensor Networks; Intrusion Detection Techniques in Sensor Networks; Remote Attestation -- Identification; On the Hardware Implementation Efficiency of Cryptographic Primitives; Author Index Wireless sensor networks (WSN) is especially vulnerable against external and internal attacks due to its particular characteristics. This book provides an overview of the major security issues that various WSN designers have to face, and also gives a comprehensive guide of solutions and open problems |
Beschreibung: | 1 Online-Ressource (v, 313 pages) |
ISBN: | 143371227X 1435678672 1586038133 1607502933 9781433712272 9781435678675 9781586038137 9781607502937 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043155982 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2008 |||| o||u| ||||||eng d | ||
020 | |a 143371227X |c ebk. |9 1-4337-1227-X | ||
020 | |a 1435678672 |c electronic bk. |9 1-4356-7867-2 | ||
020 | |a 1586038133 |9 1-58603-813-3 | ||
020 | |a 1607502933 |9 1-60750-293-3 | ||
020 | |a 9781433712272 |c ebk. |9 978-1-4337-1227-2 | ||
020 | |a 9781435678675 |c electronic bk. |9 978-1-4356-7867-5 | ||
020 | |a 9781586038137 |9 978-1-58603-813-7 | ||
020 | |a 9781607502937 |9 978-1-60750-293-7 | ||
035 | |a (OCoLC)646750827 | ||
035 | |a (DE-599)BVBBV043155982 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 681/.2 |2 22 | |
245 | 1 | 0 | |a Wireless sensor network security |c edited by Javier Lopez and Jianying Zhou |
264 | 1 | |a Amsterdam |b IOS Press |c ©2008 | |
300 | |a 1 Online-Ressource (v, 313 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Cryptology and information security series |v v. 1 | |
500 | |a Includes bibliographical references and index | ||
500 | |a Title page; Contents; Overview of Wireless Sensor Network Security; Vulnerabilities and Attacks in Wireless Sensor Networks; Symmetric Primitives; Public-Key Primitives; Key Management in Wireless Sensor Networks; WSN Link-Layer Security Frameworks; Secure Routing in Wireless Sensor Networks; Secure Data Aggregation in Wireless Sensor Networks; Privacy Protection Mechanisms for Sensor Networks; Intrusion Detection Techniques in Sensor Networks; Remote Attestation -- Identification; On the Hardware Implementation Efficiency of Cryptographic Primitives; Author Index | ||
500 | |a Wireless sensor networks (WSN) is especially vulnerable against external and internal attacks due to its particular characteristics. This book provides an overview of the major security issues that various WSN designers have to face, and also gives a comprehensive guide of solutions and open problems | ||
650 | 7 | |a TECHNOLOGY & ENGINEERING / Sensors |2 bisacsh | |
650 | 4 | |a Sensor networks |x Security measures | |
650 | 4 | |a Detectors |x Security measures | |
700 | 1 | |a López, Javier |e Sonstige |4 oth | |
700 | 1 | |a Zhou, Jianying |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=244448 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028580172 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=244448 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=244448 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175621152047104 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043155982 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)646750827 (DE-599)BVBBV043155982 |
dewey-full | 681/.2 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 681 - Precision instruments and other devices |
dewey-raw | 681/.2 |
dewey-search | 681/.2 |
dewey-sort | 3681 12 |
dewey-tens | 680 - Manufacture of products for specific uses |
discipline | Handwerk und Gewerbe / Verschiedene Technologien |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02854nmm a2200493zcb4500</leader><controlfield tag="001">BV043155982</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">143371227X</subfield><subfield code="c">ebk.</subfield><subfield code="9">1-4337-1227-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1435678672</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4356-7867-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1586038133</subfield><subfield code="9">1-58603-813-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607502933</subfield><subfield code="9">1-60750-293-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781433712272</subfield><subfield code="c">ebk.</subfield><subfield code="9">978-1-4337-1227-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781435678675</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4356-7867-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781586038137</subfield><subfield code="9">978-1-58603-813-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607502937</subfield><subfield code="9">978-1-60750-293-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)646750827</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043155982</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">681/.2</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Wireless sensor network security</subfield><subfield code="c">edited by Javier Lopez and Jianying Zhou</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">IOS Press</subfield><subfield code="c">©2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (v, 313 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Cryptology and information security series</subfield><subfield code="v">v. 1</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title page; Contents; Overview of Wireless Sensor Network Security; Vulnerabilities and Attacks in Wireless Sensor Networks; Symmetric Primitives; Public-Key Primitives; Key Management in Wireless Sensor Networks; WSN Link-Layer Security Frameworks; Secure Routing in Wireless Sensor Networks; Secure Data Aggregation in Wireless Sensor Networks; Privacy Protection Mechanisms for Sensor Networks; Intrusion Detection Techniques in Sensor Networks; Remote Attestation -- Identification; On the Hardware Implementation Efficiency of Cryptographic Primitives; Author Index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Wireless sensor networks (WSN) is especially vulnerable against external and internal attacks due to its particular characteristics. This book provides an overview of the major security issues that various WSN designers have to face, and also gives a comprehensive guide of solutions and open problems</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Sensors</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sensor networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Detectors</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">López, Javier</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Jianying</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=244448</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028580172</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=244448</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=244448</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043155982 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:19:12Z |
institution | BVB |
isbn | 143371227X 1435678672 1586038133 1607502933 9781433712272 9781435678675 9781586038137 9781607502937 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028580172 |
oclc_num | 646750827 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (v, 313 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | IOS Press |
record_format | marc |
series2 | Cryptology and information security series |
spelling | Wireless sensor network security edited by Javier Lopez and Jianying Zhou Amsterdam IOS Press ©2008 1 Online-Ressource (v, 313 pages) txt rdacontent c rdamedia cr rdacarrier Cryptology and information security series v. 1 Includes bibliographical references and index Title page; Contents; Overview of Wireless Sensor Network Security; Vulnerabilities and Attacks in Wireless Sensor Networks; Symmetric Primitives; Public-Key Primitives; Key Management in Wireless Sensor Networks; WSN Link-Layer Security Frameworks; Secure Routing in Wireless Sensor Networks; Secure Data Aggregation in Wireless Sensor Networks; Privacy Protection Mechanisms for Sensor Networks; Intrusion Detection Techniques in Sensor Networks; Remote Attestation -- Identification; On the Hardware Implementation Efficiency of Cryptographic Primitives; Author Index Wireless sensor networks (WSN) is especially vulnerable against external and internal attacks due to its particular characteristics. This book provides an overview of the major security issues that various WSN designers have to face, and also gives a comprehensive guide of solutions and open problems TECHNOLOGY & ENGINEERING / Sensors bisacsh Sensor networks Security measures Detectors Security measures López, Javier Sonstige oth Zhou, Jianying Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=244448 Aggregator Volltext |
spellingShingle | Wireless sensor network security TECHNOLOGY & ENGINEERING / Sensors bisacsh Sensor networks Security measures Detectors Security measures |
title | Wireless sensor network security |
title_auth | Wireless sensor network security |
title_exact_search | Wireless sensor network security |
title_full | Wireless sensor network security edited by Javier Lopez and Jianying Zhou |
title_fullStr | Wireless sensor network security edited by Javier Lopez and Jianying Zhou |
title_full_unstemmed | Wireless sensor network security edited by Javier Lopez and Jianying Zhou |
title_short | Wireless sensor network security |
title_sort | wireless sensor network security |
topic | TECHNOLOGY & ENGINEERING / Sensors bisacsh Sensor networks Security measures Detectors Security measures |
topic_facet | TECHNOLOGY & ENGINEERING / Sensors Sensor networks Security measures Detectors Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=244448 |
work_keys_str_mv | AT lopezjavier wirelesssensornetworksecurity AT zhoujianying wirelesssensornetworksecurity |