Limit search to available items
Book Cover
E-book
Author Oreku, George S., author

Title Security in wireless sensor networks / George S. Oreku, Tamara Pazynyuk
Published [Cham] : Springer, [2015]
©2016

Copies

Description 1 online resource (xvii, 87 pages) : illustrations (some color)
Series Risk engineering, 2195-433X
Risk engineering (Springer (Firm))
Contents Machine generated contents note: 1. Introduction and Overview -- 1.1. WSN Security -- 1.1.1. Obstacles of WSN Security -- 1.1.2. Security Requirements -- 1.1.3. Attacks -- 1.1.4. Defensive Measures -- 1.2. Attackers Motivation -- 1.3. Research Challenges -- 1.4. Motivation of the Book -- 1.5. Contribution of the Book -- 1.6. Outline of the Book -- References -- 2. QoS as Means of Providing WSN Security -- 2.1. Introduction -- 2.2. QoS in Wireless Networks -- 2.2.1. QoS Concept -- 2.2.2. QoS Metrics -- 2.2.3. Security and QoS -- 2.2.4. QoS Challenges in Sensor Networks -- 2.3. Effect of Security on QoS -- 2.4. Reliability, Availability and Serviceability (RAS) -- 2.5. Calculating Availability and Probability Within WSN -- 2.6. Proposed Security Models -- 2.7. Experiment Evaluation -- 2.8. Summary -- References -- 3. Mathematical Model for Wireless Sensor Nodes Security -- 3.1. Introduction -- 3.2. Barrier Security -- 3.3. Problem Statement and Mathematical Model Design -- 3.4. Formalization -- 3.5. Ensuring Passive Resistance to Threat on Sensor Nodes -- 3.6. Nodes Model Application -- 3.7. Summary -- References -- 4. Improved Feistel-Based Ciphers for Wireless Sensor Network Security -- 4.1. Introduction -- 4.2. Attacks Threats -- 4.3. Efficiency of Existing WSN Algorithms -- 4.4. Techniques of Proposed Method -- 4.4.1. Feistel Scheme -- 4.4.2. Theoretical Approach of CPB -- 4.4.3. Improved Feistel Scheme for Block Data Transformation -- 4.5. Comparison of CPB-Feistel Scheme Based Ciphers Versus Ciphers with No CPB -- 4.6. Summary -- References -- 5. Distributed Signature Scheme (DSS) Based on RSA -- 5.1. Introduction -- 5.2. RSA Based Secure Schemes -- 5.3. RSA Based Distributed Signature Scheme -- 5.3.1. Distributed Signature Features -- 5.3.2. RSA Based Secret Key Distributions Main Approaches -- 5.4. Our Approach on Scheme Establishment -- 5.4.1. Scheme Initialization -- 5.4.2. Generation of Distributive Signature -- 5.4.3. Key Projection Distribution to New User -- 5.5. Summary -- References -- 6. Reliable Data Aggregation Protocol for Wireless Sensor Networks -- 6.1. Introduction -- 6.2. Problem Statement -- 6.3. Existing Data Aggregation Protocols -- 6.4. Proposed Protocol -- 6.5. Security Assumptions -- 6.6. Experiment Evaluation -- 6.7. Summary -- References
Summary This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts and practitioners in the field of sensor network security, but the book may also be beneficial for researchers in academia as well as for graduate students
Notes Online resource; title from PDF title page (SpringerLink, viewed September 16, 2015)
Subject Wireless sensor networks -- Security measures
Applied mathematics.
Network hardware.
Combinatorics & graph theory.
Reliability engineering.
Communications engineering -- telecommunications.
COMPUTERS -- Computer Literacy.
COMPUTERS -- Computer Science.
COMPUTERS -- Data Processing.
COMPUTERS -- Hardware -- General.
COMPUTERS -- Information Technology.
COMPUTERS -- Machine Theory.
COMPUTERS -- Reference.
Form Electronic book
Author Pazynyuk, Tamara, author
ISBN 9783319212692
3319212699