This book discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. It contains example applications for target tracking, scientific exploration and data acquisition in hazardous environments, and includes a fairly new study on capabilities of mu-TESLA, a broadcast authentication technique for wireless sensor networks. The book assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain.... called beacon nodes , which are assumed to know their own locations (e.g., through GPS receivers or manual configuration). ... Specifically, each beacon packet should be authenticated with a cryptographic key only known to the sender and the intended ... Some solutions to address this problem are provided in Chapter 5. 1.4 Orgnization of the Book The organization of this book 6 1 Introduction V.
Title | : | Security for Wireless Sensor Networks |
Author | : | Donggang Liu, Peng Ning |
Publisher | : | Springer Science & Business Media - 2007-02-15 |
You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.
Once you have finished the sign-up process, you will be redirected to your download Book page.
How it works: