Description |
1 online resource (xii, 406 pages) : illustrations. |
Physical Medium |
polychrome |
Description |
text file |
Series |
Series in computer and network security ; v. 3
|
|
Computer and network security ; v. 3.
|
Bibliography |
Includes bibliographical references. |
Contents |
pt. 1. Authentication and confidentiality -- pt. 2. Privacy -- pt. 3. Reliability -- pt. 4. Network management and configuration. |
Summary |
Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas. |
Local Note |
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America |
Subject |
Sensor networks -- Security measures.
|
|
Sensor networks. |
|
Security systems. |
|
Wireless communication systems -- Security measures.
|
|
Wireless communication systems -- Security measures. |
|
Computer networks -- Security measures.
|
|
Computer networks -- Security measures. |
Genre/Form |
Electronic books.
|
|
Electronic books.
|
Added Author |
McNair, Janise (Janise Yvette), 1968-
|
|
Corbett, Cherita (Cherita L.)
|
Other Form: |
Print version: Beyah, Raheem (Raheem A.), 1976- Security in ad hoc and sensor networks. Singapore ; Hackensack, NJ : World Scientific, ©2010 9789814271080 (OCoLC)456137797 |
ISBN |
9789814271097 (electronic book) |
|
9814271098 (electronic book) |
|
9789814271080 |
|
981427108X |
|