Atjaunināt sīkdatņu piekrišanu

Secure Wireless Sensor Networks: Threats and Solutions 1st ed. 2015 [Hardback]

  • Formāts: Hardback, 169 pages, height x width: 235x155 mm, weight: 4026 g, XIII, 169 p., 1 Hardback
  • Sērija : Advances in Information Security 65
  • Izdošanas datums: 09-Nov-2015
  • Izdevniecība: Springer-Verlag New York Inc.
  • ISBN-10: 1493934589
  • ISBN-13: 9781493934584
  • Hardback
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Hardback, 169 pages, height x width: 235x155 mm, weight: 4026 g, XIII, 169 p., 1 Hardback
  • Sērija : Advances in Information Security 65
  • Izdošanas datums: 09-Nov-2015
  • Izdevniecība: Springer-Verlag New York Inc.
  • ISBN-10: 1493934589
  • ISBN-13: 9781493934584
This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone attack.

It examines a number of areas and problems to which WSNs are applied continuously, including: supporting rescue operations, building surveillance, fire prevention, battlefield monitoring and more. However, known and unknown threats still affect WSNs and in many applications of this new technology the security of the network is a fundamental issue for confidentiality, integrity, authenticity and availability. The last section of the book addresses security for a common WSN service. Case studies are provided throughout.

Secure Wireless Sensor Networks: Threats and Solutions targets advanced-level students and researchers in computer science and electrical engineering as a secondary text book. Professionals working in the wireless sensor networks field will also find this book useful as a reference.









 
1 Introduction
1(30)
1.1 Wireless Sensor Networks
1(6)
1.1.1 Applications
2(1)
1.1.2 Enabling Technologies
3(2)
1.1.3 Constraints
5(2)
1.2 Security Issues in Wireless Sensor Networks
7(19)
1.2.1 Security Requirements and Related Issues
8(3)
1.2.2 Attacks
11(3)
1.2.3 Defensive Measures
14(12)
1.3 Book Contributions
26(2)
1.4 Book Overview
28(3)
2 Pair-Wise Key Establishment
31(22)
2.1 Introduction
31(2)
2.2 Related Work
33(1)
2.3 Preliminaries and Assumptions
34(2)
2.3.1 Security Requirements and Threat Model
34(2)
2.4 The ECCE Protocol
36(3)
2.5 Security Analysis
39(5)
2.5.1 Channel Existence
40(3)
2.5.2 Channel Resilience
43(1)
2.5.3 Probabilistic Authentication
43(1)
2.6 Simulations and Discussion
44(8)
2.7 Concluding Remarks
52(1)
3 Capture Detection
53(22)
3.1 Introduction
53(2)
3.2 Related Work and Background
55(3)
3.3 Node Capture Detection Through Mobility and Cooperation
58(3)
3.3.1 Benchmark Solution
58(1)
3.3.2 Our Approach
59(1)
3.3.3 Assumptions and Notation
60(1)
3.4 The Protocol
61(3)
3.4.1 Protocol Description
61(3)
3.5 Simulations and Discussion
64(9)
3.5.1 Node Re-Meeting
64(4)
3.5.2 Experimental Results
68(3)
3.5.3 Massive Attacks
71(1)
3.5.4 Other Mobility Patterns
71(2)
3.6 Concluding Remarks
73(2)
4 Clone Detection
75(26)
4.1 Introduction
76(1)
4.2 Related Work
77(3)
4.3 The Threat Model
80(1)
4.4 Requirements for the Distributed Detection Protocol
81(2)
4.4.1 Witness Distribution
81(1)
4.4.2 Overhead
82(1)
4.5 The RED Protocol
83(3)
4.6 Simulations
86(8)
4.6.1 Witness Distribution
87(2)
4.6.2 Storage Overhead
89(1)
4.6.3 Energy Overhead
90(4)
4.7 Detection Probability with Malicious Nodes
94(6)
4.8 Concluding Remarks
100(1)
5 Secure Data Aggregation
101(24)
5.1 Introduction
101(3)
5.2 Related Work
104(3)
5.2.1 Greenwald et al.'s Approximate Median Algorithm
105(1)
5.2.2 Chan et al.'s Verification Algorithm
106(1)
5.3 Assumptions and Problem Description
107(2)
5.4 Computing and Verifying an Approximate Median
109(5)
5.4.1 GC Approach
109(1)
5.4.2 A Histogram Verification Algorithm
110(2)
5.4.3 Our Basic Protocol
112(2)
5.5 Security and Performance Analysis of Our Basic Protocol
114(3)
5.5.1 Security Analysis
114(1)
5.5.2 Performance Analysis
115(2)
5.6 Attack-Resilient Median Computation
117(4)
5.6.1 Geographical Grouping
118(3)
5.7 Simulation Results
121(2)
5.7.1 Simulation Environment
121(1)
5.7.2 Results and Discussion
122(1)
5.8 Concluding Remarks
123(2)
6 Privacy in Data Aggregation
125(30)
6.1 Introduction
125(2)
6.2 Related Work
127(1)
6.3 Network Assumptions and Threat Model
128(1)
6.4 Protocol Overview
129(2)
6.5 Twin-Key Agreement
131(5)
6.5.1 Twin-Key Agreement: Protocol Description
132(4)
6.6 Data Aggregation
136(5)
6.6.1 Twin-Key Liveness Announcement: Protocol Description
136(3)
6.6.2 Data Aggregation with Shadow Values: Protocol Description
139(2)
6.6.3 A Complete Protocol Run
141(1)
6.7 Security and Complexity Analysis
141(12)
6.7.1 Parameter Study
141(2)
6.7.2 Security Analysis
143(7)
6.7.3 Complexity Analysis
150(3)
6.7.4 Comparison
153(1)
6.8 Concluding Remarks
153(2)
7 Conclusions and Future Works
155(2)
References 157