Seller
RRP: £44.99
Save £6.51 (14%)
Printed on Demand
Dispatched within 7-9 working days.
Security for Wireless Sensor Networks using Identity-Based Cryptography
Synopsis
Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.
After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN.
Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.
New & Used
Seller |
Information |
Condition |
Price |
|
| - | New | £38.48 + FREE UK P & P | |
What Reviewers Are Saying
" ... an excellent starting point for practitioners in the industry and students in academia faced with security issues in WSNs. It provides a comprehensive and systematic introduction to the fundamental concepts, major issues, and effective security solutions in wireless sensor networking."-IEEE Communications Magazine, October 2013
"Getting the right balance of systems security is a hard enough task in traditional networking, let alone securing a wireless network composed of sensors with high resource limitations that, nonetheless, can collaborate to perform complex tasks. This book serves as an excellent starting point for practitioners in the industry and students in academia to come up to speed with security issues in wireless sensor networks."
-Vijay K. Gurbani, Ph.D., Distinguished Member of Technical Staff, Bell Laboratories, Alcatel-Lucent; Adjunct Professor, Department of Computer Science, Illinois Institute of Technology
"Strong identity mechanisms are a hard sell for today's Net because people feel that they know who they're talking to. In the Internet of Things with its focus on unfeeling machine-to-machine communications, we must replace 'feeling secure' with actually being secure. Wireless sensors are the eyes, ears, noses and cat-whiskers of the Internet of Things. Yet these sensors are connected by a network that can be subverted by hostile parties, risking that their output could be diverted or false information inserted. Given the vast number of sensors to be deployed, cryptographic identity systems may be the only manageable approach to trusting our senses."-Dean Willis, Chair, IETF SIP Working Group, 1999-2009
"... a valuable reference on IBC theory and practice that researchers and practitioners will want on their bookshelves for many years. In addition, it will certainly stimulate new directions in research in wireless network security." -Thomas M. Chen, Editor-in-Chief, IEEE Network, 2009-2011