Security and privacy in smart sensor networks:
"This book explores current research on how to implement smart sensor networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, lightweight crypto and security solutions, authentication and intrusion detection"--
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[c2018]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book explores current research on how to implement smart sensor networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, lightweight crypto and security solutions, authentication and intrusion detection"-- |
Beschreibung: | 29 PDFs (xxii, 441 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522557371 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00192029 | ||
003 | IGIG | ||
005 | 20180409113317.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 180410s2018 pau fob 001 0 eng d | ||
010 | |z 2017055702 | ||
020 | |a 9781522557371 |q ebook | ||
020 | |z 9781522557364 |q hardcover | ||
024 | 7 | |a 10.4018/978-1-5225-5736-4 |2 doi | |
035 | |a (CaBNVSL)slc20342252 | ||
035 | |a (OCoLC)1031311883 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a TK7872.D48 |b S425 2019e | |
082 | 7 | |a 006..2/5 |2 23 | |
245 | 0 | 0 | |a Security and privacy in smart sensor networks |c Yassine Maleh, Abdellah Ezzati, and Mustapha Belaissaoui, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [c2018] | |
300 | |a 29 PDFs (xxii, 441 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Section 1. Smart sensor protocols and cryptographic algorithms. Chapter 1. Key management protocols for smart sensor networks ; Chapter 2. Secure and energy-efficient routing for cluster-based wireless sensor networks ; Chapter 3. Trust management in vehicular Ad hoc network ; Chapter 4. An optimized reputation-based trust management scheme for MANET security ; Chapter 5. Trust management issues for sensors security and privacy in the smart grid -- Section 2. Security and privacy in the internet of things (IoT). Chapter 6. Security in the internet of things ; Chapter 7. Trust management in the internet of things ; Chapter 8. Security threats in the internet of things: RPL's attacks and countermeasures ; Chapter 9. IoT security based on content-centric networking architecture -- Section 3. Smart networks: access control and intrusion detection systems. Chapter 10. Network access control and collaborative security against APT and AET ; Chapter 11. A novel real-time lighting-invariant lane departure warning system ; Chapter 12. A review of intrusion detection systems in cloud computing ; Chapter 13. A secure routing scheme against malicious nodes in Ad hoc networks -- Section 4. Smart networks: security management and methods. Chapter 14. A state-of-the-art assessment of US and EU c-ITS security solutions ; Chapter 15. Security in 4G: IP multimedia subsystem (IMS) use case ; Chapter 16. Security of information exchange between readers and tags. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book explores current research on how to implement smart sensor networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, lightweight crypto and security solutions, authentication and intrusion detection"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 04/10/2018). | ||
650 | 0 | |a Sensor networks |x Security measures. | |
700 | 1 | |a Belaissaoui, Mustapha |d 1968- |e editor. | |
700 | 1 | |a Ezzati, Abdellah |d 1966- |e editor. | |
700 | 1 | |a Maleh, Yassine |d 1987- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2017055702 | |
776 | 0 | 8 | |i Print version: |z 1522557369 |z 9781522557364 |w (DLC) 2017055702 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5736-4 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00192029 |
---|---|
_version_ | 1804751456916471808 |
adam_text | |
any_adam_object | |
author2 | Belaissaoui, Mustapha 1968- Ezzati, Abdellah 1966- Maleh, Yassine 1987- |
author2_role | edt edt edt |
author2_variant | m b mb a e ae y m ym |
author_facet | Belaissaoui, Mustapha 1968- Ezzati, Abdellah 1966- Maleh, Yassine 1987- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK7872 |
callnumber-raw | TK7872.D48 S425 2019e |
callnumber-search | TK7872.D48 S425 2019e |
callnumber-sort | TK 47872 D48 S425 42019E |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB |
contents | Section 1. Smart sensor protocols and cryptographic algorithms. Chapter 1. Key management protocols for smart sensor networks ; Chapter 2. Secure and energy-efficient routing for cluster-based wireless sensor networks ; Chapter 3. Trust management in vehicular Ad hoc network ; Chapter 4. An optimized reputation-based trust management scheme for MANET security ; Chapter 5. Trust management issues for sensors security and privacy in the smart grid -- Section 2. Security and privacy in the internet of things (IoT). Chapter 6. Security in the internet of things ; Chapter 7. Trust management in the internet of things ; Chapter 8. Security threats in the internet of things: RPL's attacks and countermeasures ; Chapter 9. IoT security based on content-centric networking architecture -- Section 3. Smart networks: access control and intrusion detection systems. Chapter 10. Network access control and collaborative security against APT and AET ; Chapter 11. A novel real-time lighting-invariant lane departure warning system ; Chapter 12. A review of intrusion detection systems in cloud computing ; Chapter 13. A secure routing scheme against malicious nodes in Ad hoc networks -- Section 4. Smart networks: security management and methods. Chapter 14. A state-of-the-art assessment of US and EU c-ITS security solutions ; Chapter 15. Security in 4G: IP multimedia subsystem (IMS) use case ; Chapter 16. Security of information exchange between readers and tags. |
ctrlnum | (CaBNVSL)slc20342252 (OCoLC)1031311883 |
dewey-full | 006..2/5 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006..2/5 |
dewey-search | 006..2/5 |
dewey-sort | 16 12 15 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03522nam a2200457 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00192029</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20180409113317.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">180410s2018 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2017055702</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522557371</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522557364</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-5736-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc20342252</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1031311883</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK7872.D48</subfield><subfield code="b">S425 2019e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">006..2/5</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Security and privacy in smart sensor networks </subfield><subfield code="c">Yassine Maleh, Abdellah Ezzati, and Mustapha Belaissaoui, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[c2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">29 PDFs (xxii, 441 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Section 1. Smart sensor protocols and cryptographic algorithms. Chapter 1. Key management protocols for smart sensor networks ; Chapter 2. Secure and energy-efficient routing for cluster-based wireless sensor networks ; Chapter 3. Trust management in vehicular Ad hoc network ; Chapter 4. An optimized reputation-based trust management scheme for MANET security ; Chapter 5. Trust management issues for sensors security and privacy in the smart grid -- Section 2. Security and privacy in the internet of things (IoT). Chapter 6. Security in the internet of things ; Chapter 7. Trust management in the internet of things ; Chapter 8. Security threats in the internet of things: RPL's attacks and countermeasures ; Chapter 9. IoT security based on content-centric networking architecture -- Section 3. Smart networks: access control and intrusion detection systems. Chapter 10. Network access control and collaborative security against APT and AET ; Chapter 11. A novel real-time lighting-invariant lane departure warning system ; Chapter 12. A review of intrusion detection systems in cloud computing ; Chapter 13. A secure routing scheme against malicious nodes in Ad hoc networks -- Section 4. Smart networks: security management and methods. Chapter 14. A state-of-the-art assessment of US and EU c-ITS security solutions ; Chapter 15. Security in 4G: IP multimedia subsystem (IMS) use case ; Chapter 16. Security of information exchange between readers and tags.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book explores current research on how to implement smart sensor networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, lightweight crypto and security solutions, authentication and intrusion detection"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 04/10/2018).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Sensor networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Belaissaoui, Mustapha</subfield><subfield code="d">1968-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ezzati, Abdellah</subfield><subfield code="d">1966-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maleh, Yassine</subfield><subfield code="d">1987-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2017055702</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522557369</subfield><subfield code="z">9781522557364</subfield><subfield code="w">(DLC) 2017055702</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5736-4</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00192029 |
illustrated | Not Illustrated |
indexdate | 2024-07-16T15:51:51Z |
institution | BVB |
isbn | 9781522557371 |
language | English |
oclc_num | 1031311883 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 29 PDFs (xxii, 441 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | IGI Global, |
record_format | marc |
spelling | Security and privacy in smart sensor networks Yassine Maleh, Abdellah Ezzati, and Mustapha Belaissaoui, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [c2018] 29 PDFs (xxii, 441 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Section 1. Smart sensor protocols and cryptographic algorithms. Chapter 1. Key management protocols for smart sensor networks ; Chapter 2. Secure and energy-efficient routing for cluster-based wireless sensor networks ; Chapter 3. Trust management in vehicular Ad hoc network ; Chapter 4. An optimized reputation-based trust management scheme for MANET security ; Chapter 5. Trust management issues for sensors security and privacy in the smart grid -- Section 2. Security and privacy in the internet of things (IoT). Chapter 6. Security in the internet of things ; Chapter 7. Trust management in the internet of things ; Chapter 8. Security threats in the internet of things: RPL's attacks and countermeasures ; Chapter 9. IoT security based on content-centric networking architecture -- Section 3. Smart networks: access control and intrusion detection systems. Chapter 10. Network access control and collaborative security against APT and AET ; Chapter 11. A novel real-time lighting-invariant lane departure warning system ; Chapter 12. A review of intrusion detection systems in cloud computing ; Chapter 13. A secure routing scheme against malicious nodes in Ad hoc networks -- Section 4. Smart networks: security management and methods. Chapter 14. A state-of-the-art assessment of US and EU c-ITS security solutions ; Chapter 15. Security in 4G: IP multimedia subsystem (IMS) use case ; Chapter 16. Security of information exchange between readers and tags. Restricted to subscribers or individual electronic text purchasers. "This book explores current research on how to implement smart sensor networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, lightweight crypto and security solutions, authentication and intrusion detection"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 04/10/2018). Sensor networks Security measures. Belaissaoui, Mustapha 1968- editor. Ezzati, Abdellah 1966- editor. Maleh, Yassine 1987- editor. IGI Global, publisher. (Original) (DLC)2017055702 Print version: 1522557369 9781522557364 (DLC) 2017055702 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5736-4 Volltext |
spellingShingle | Security and privacy in smart sensor networks Section 1. Smart sensor protocols and cryptographic algorithms. Chapter 1. Key management protocols for smart sensor networks ; Chapter 2. Secure and energy-efficient routing for cluster-based wireless sensor networks ; Chapter 3. Trust management in vehicular Ad hoc network ; Chapter 4. An optimized reputation-based trust management scheme for MANET security ; Chapter 5. Trust management issues for sensors security and privacy in the smart grid -- Section 2. Security and privacy in the internet of things (IoT). Chapter 6. Security in the internet of things ; Chapter 7. Trust management in the internet of things ; Chapter 8. Security threats in the internet of things: RPL's attacks and countermeasures ; Chapter 9. IoT security based on content-centric networking architecture -- Section 3. Smart networks: access control and intrusion detection systems. Chapter 10. Network access control and collaborative security against APT and AET ; Chapter 11. A novel real-time lighting-invariant lane departure warning system ; Chapter 12. A review of intrusion detection systems in cloud computing ; Chapter 13. A secure routing scheme against malicious nodes in Ad hoc networks -- Section 4. Smart networks: security management and methods. Chapter 14. A state-of-the-art assessment of US and EU c-ITS security solutions ; Chapter 15. Security in 4G: IP multimedia subsystem (IMS) use case ; Chapter 16. Security of information exchange between readers and tags. Sensor networks Security measures. |
title | Security and privacy in smart sensor networks |
title_auth | Security and privacy in smart sensor networks |
title_exact_search | Security and privacy in smart sensor networks |
title_full | Security and privacy in smart sensor networks Yassine Maleh, Abdellah Ezzati, and Mustapha Belaissaoui, editors. |
title_fullStr | Security and privacy in smart sensor networks Yassine Maleh, Abdellah Ezzati, and Mustapha Belaissaoui, editors. |
title_full_unstemmed | Security and privacy in smart sensor networks Yassine Maleh, Abdellah Ezzati, and Mustapha Belaissaoui, editors. |
title_short | Security and privacy in smart sensor networks |
title_sort | security and privacy in smart sensor networks |
topic | Sensor networks Security measures. |
topic_facet | Sensor networks Security measures. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5736-4 |
work_keys_str_mv | AT belaissaouimustapha securityandprivacyinsmartsensornetworks AT ezzatiabdellah securityandprivacyinsmartsensornetworks AT malehyassine securityandprivacyinsmartsensornetworks AT igiglobal securityandprivacyinsmartsensornetworks |