Description |
1 online resource (xvii, 87 pages) : illustrations (some color) |
Series |
Risk engineering, 2195-433X |
|
Risk engineering (Springer (Firm))
|
Contents |
Machine generated contents note: 1. Introduction and Overview -- 1.1. WSN Security -- 1.1.1. Obstacles of WSN Security -- 1.1.2. Security Requirements -- 1.1.3. Attacks -- 1.1.4. Defensive Measures -- 1.2. Attackers Motivation -- 1.3. Research Challenges -- 1.4. Motivation of the Book -- 1.5. Contribution of the Book -- 1.6. Outline of the Book -- References -- 2. QoS as Means of Providing WSN Security -- 2.1. Introduction -- 2.2. QoS in Wireless Networks -- 2.2.1. QoS Concept -- 2.2.2. QoS Metrics -- 2.2.3. Security and QoS -- 2.2.4. QoS Challenges in Sensor Networks -- 2.3. Effect of Security on QoS -- 2.4. Reliability, Availability and Serviceability (RAS) -- 2.5. Calculating Availability and Probability Within WSN -- 2.6. Proposed Security Models -- 2.7. Experiment Evaluation -- 2.8. Summary -- References -- 3. Mathematical Model for Wireless Sensor Nodes Security -- 3.1. Introduction -- 3.2. Barrier Security -- 3.3. Problem Statement and Mathematical Model Design -- 3.4. Formalization -- 3.5. Ensuring Passive Resistance to Threat on Sensor Nodes -- 3.6. Nodes Model Application -- 3.7. Summary -- References -- 4. Improved Feistel-Based Ciphers for Wireless Sensor Network Security -- 4.1. Introduction -- 4.2. Attacks Threats -- 4.3. Efficiency of Existing WSN Algorithms -- 4.4. Techniques of Proposed Method -- 4.4.1. Feistel Scheme -- 4.4.2. Theoretical Approach of CPB -- 4.4.3. Improved Feistel Scheme for Block Data Transformation -- 4.5. Comparison of CPB-Feistel Scheme Based Ciphers Versus Ciphers with No CPB -- 4.6. Summary -- References -- 5. Distributed Signature Scheme (DSS) Based on RSA -- 5.1. Introduction -- 5.2. RSA Based Secure Schemes -- 5.3. RSA Based Distributed Signature Scheme -- 5.3.1. Distributed Signature Features -- 5.3.2. RSA Based Secret Key Distributions Main Approaches -- 5.4. Our Approach on Scheme Establishment -- 5.4.1. Scheme Initialization -- 5.4.2. Generation of Distributive Signature -- 5.4.3. Key Projection Distribution to New User -- 5.5. Summary -- References -- 6. Reliable Data Aggregation Protocol for Wireless Sensor Networks -- 6.1. Introduction -- 6.2. Problem Statement -- 6.3. Existing Data Aggregation Protocols -- 6.4. Proposed Protocol -- 6.5. Security Assumptions -- 6.6. Experiment Evaluation -- 6.7. Summary -- References |
Summary |
This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts and practitioners in the field of sensor network security, but the book may also be beneficial for researchers in academia as well as for graduate students |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed September 16, 2015) |
Subject |
Wireless sensor networks -- Security measures
|
|
Applied mathematics.
|
|
Network hardware.
|
|
Combinatorics & graph theory.
|
|
Reliability engineering.
|
|
Communications engineering -- telecommunications.
|
|
COMPUTERS -- Computer Literacy.
|
|
COMPUTERS -- Computer Science.
|
|
COMPUTERS -- Data Processing.
|
|
COMPUTERS -- Hardware -- General.
|
|
COMPUTERS -- Information Technology.
|
|
COMPUTERS -- Machine Theory.
|
|
COMPUTERS -- Reference.
|
Form |
Electronic book
|
Author |
Pazynyuk, Tamara, author
|
ISBN |
9783319212692 |
|
3319212699 |
|