32,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
  • Broschiertes Buch

Security issues in Wireless sensor networks (WSNs) mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that…mehr

Produktbeschreibung
Security issues in Wireless sensor networks (WSNs)
mainly come from attacks. In general, the attacks in
WSNs can be classified as external attacks and
internal attacks. In an external attack, the
attacking node is not an authorized participant of
the sensor network. Cryptography and other security
methods can prevent some of external attacks.
However, node compromise, the major and unique
problem that leads to internal attacks, will
eliminate all the efforts. Knowing the probability
of node compromise will help systems to detect and
defend against it. Although there are some
approaches that can be used to detect and defend
against node compromise, few of them have the
ability to estimate the probability of node
compromise. Hence, we develop basic uniform, basic
gradient, intelligent uniform and intelligent
gradient models for node compromise distribution in
order to adapt to different application
environments. These models allow systems to estimate
the probability of node compromise. Applying these
models in system security designs can improve system
security and decrease the overheads nearly in every
security area.
Autorenporträt
Xiangqian Chen received the PhD degree in Electrical and Computer Engineering from Florida International University in December 2007. His current research interests include wireless & mobile computing, wireless communications, network security, ad hoc and sensor networks.