46,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
23 °P sammeln
  • Broschiertes Buch

Wireless sensor networks have great potential to be employed in mission critical situations like battlefields but also in more everyday security and commercial applications such as building and traffic surveillance, habitat monitoring and smart homes. However, wireless sensor networks pose unique security challenges. This book presents a security framework WSNSF (Wireless Sensor Networks Security Framework) to provide a comprehensive security solution against the known attacks in wireless sensor networks. The proposed framework consists of four interacting components: a secure triple-key…mehr

Produktbeschreibung
Wireless sensor networks have great potential to be employed in mission critical situations like battlefields but also in more everyday security and commercial applications such as building and traffic surveillance, habitat monitoring and smart homes. However, wireless sensor networks pose unique security challenges. This book presents a security framework WSNSF (Wireless Sensor Networks Security Framework) to provide a comprehensive security solution against the known attacks in wireless sensor networks. The proposed framework consists of four interacting components: a secure triple-key (STKS) scheme, secure routing algorithms (SRAs), a secure localization technique (SLT) and a malicious node detection mechanism. Singly, each of these components can achieve certain level of security. However, when deployed as a framework, a high degree of security is achievable. WSNSF takes into consideration the communication and computation limitations of sensor networks. While there is alwaysa trade off between security and performance, experimental results prove that the proposed framework can achieve high degree of security with negligible overheads.
Autorenporträt
Tanveer Zia, PhD., Senior Member IEEE, MACS (Snr CP), Member AISA, is a Senior Lecturer in Computing and Associate Head of School, School of Computing and Mathematics, Charles Sturt University, Australia. He has earned his PhD from the University of Sydney in 2008 and has several years of teaching and research experience in computing security.