Mohsen A. M. El-Bendary
Developing Security Tools of WSN and WBAN Networks Applications
Mohsen A. M. El-Bendary
Developing Security Tools of WSN and WBAN Networks Applications
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book focuses on two of the most rapidly developing areas in wireless technology (WT) applications, namely, wireless sensors networks (WSNs) and wireless body area networks (WBANs). These networks can be considered smart applications of the recent WT revolutions. The book presents various security tools and scenarios for the proposed enhanced-security of WSNs, which are supplemented with numerous computer simulations. In the computer simulation section, WSN modeling is addressed using MATLAB programming language.
Andere Kunden interessierten sich auch für
- Mohsen A. M. El-BendaryDeveloping Security Tools of WSN and WBAN Networks Applications74,99 €
- Security and Privacy Issues in IoT Devices and Sensor Networks82,99 €
- Mohsen A. M. Kassem El- BendarySecurity for Multi-hop Wireless Networks37,99 €
- Proceedings of International Conference on Communication and Networks148,99 €
- Maarten LontWake-up Receiver Based Ultra-Low-Power WBAN74,99 €
- Pardeep KumarAN INTELLIGENT APPROACH ON SECURITY AND PRIVACY IN WSN46,99 €
- Anupma MarwahaAntenna Design for Bio-Telemetry Applications32,99 €
-
-
-
This book focuses on two of the most rapidly developing areas in wireless technology (WT) applications, namely, wireless sensors networks (WSNs) and wireless body area networks (WBANs). These networks can be considered smart applications of the recent WT revolutions. The book presents various security tools and scenarios for the proposed enhanced-security of WSNs, which are supplemented with numerous computer simulations. In the computer simulation section, WSN modeling is addressed using MATLAB programming language.
Produktdetails
- Produktdetails
- Lecture Notes in Electrical Engineering 316
- Verlag: Springer / Springer Japan / Springer, Berlin
- Artikelnr. des Verlages: 978-4-431-55068-6
- 2015
- Seitenzahl: 232
- Erscheinungstermin: 27. November 2014
- Englisch
- Abmessung: 241mm x 160mm x 19mm
- Gewicht: 503g
- ISBN-13: 9784431550686
- ISBN-10: 4431550682
- Artikelnr.: 40823079
- Lecture Notes in Electrical Engineering 316
- Verlag: Springer / Springer Japan / Springer, Berlin
- Artikelnr. des Verlages: 978-4-431-55068-6
- 2015
- Seitenzahl: 232
- Erscheinungstermin: 27. November 2014
- Englisch
- Abmessung: 241mm x 160mm x 19mm
- Gewicht: 503g
- ISBN-13: 9784431550686
- ISBN-10: 4431550682
- Artikelnr.: 40823079
Name: MOHSEN AHMED MAHMOUD MOHAMED KASSEM EL-BENDARY. Date of birth: 20-9-1975. Phone: 002-02-33266239 Mobile: 0020-128-8712859 0020-106-0747274 Affiliation: Department of Electronics and Communications Technology, Faculty of Industrial Education, Helwan University, Cairo, Egypt. Qualifications: 1- BSc. in Electrical Communications, Faculty of Electronic Engineering, Menoufia University, May 1998. 2- MSc. in Electrical Communications "Improving Performance Bluetooth Networks through Channel Codding ", Faculty of Electronic Engineering, Menoufia University, 2008. 3- PhD. in Electrical Communications "Efficient Multimedia Transmission over Bluetooth System", Faculty of Electronic Engineering, Menoufia University, 2012.
Introduction.- Wireless Network Overview.- Sensing Networks.- WSN Overview.- WBAN Overview.- WSN and Embedding System Relation.- Wireless Sensing Networks Contents.- .Wireless, Mobile, and Ad-hoc Networks.- .Book Organizing.- . SENSING AND ENVIRONMENT CONCEPTS.- Introduction.- Sensing Definition.- Environment Concepts.- WSN and Environment.- Environment and Medical Care Concerns.- WSNs and Sensors.- Sensing Examples.- WIRELESS NETWORKS.- Introduction.- Low-Rate Wireless Networks.- Bluetooth Networks Architecture.- Adaptive packets of WPAN technology.- THROUGHPUT STUDY OF LOW-RATE COMMUNICATIONS.- Introduction.- Related Work.- Throughput Definition of WSN and WBAN.- Analysis of PEP.- The Proposed Scenarios.- Simulation Assumptions.- Simulation Results.- Chapter Recommendation.- WSN SECURITY NEEDS.- Introduction.- Security goals.- Fundamentals of Network Security.- Challenges of WSN Security.- WSN Implementation Technologies.- Summary.- LOWER COMPLEXITY OF SECURED WSN NETWORKS.- Power with FEC.- Complexity FEC dependant.- Interleaving Techniques.- Interleavers Investigation.- Chaotic Interleaver Structure.- Cryptography using Chaos.- Objective quality Metrics.- Jakes Method.- Mobility Effects.- Cooperative Algorithm of WSN.- Appendixes.
Introduction.- Wireless Network Overview.- Sensing Networks.- WSN Overview.- WBAN Overview.- WSN and Embedding System Relation.- Wireless Sensing Networks Contents.- .Wireless, Mobile, and Ad-hoc Networks.- .Book Organizing.- . SENSING AND ENVIRONMENT CONCEPTS.- Introduction.- Sensing Definition.- Environment Concepts.- WSN and Environment.- Environment and Medical Care Concerns.- WSNs and Sensors.- Sensing Examples.- WIRELESS NETWORKS.- Introduction.- Low-Rate Wireless Networks.- Bluetooth Networks Architecture.- Adaptive packets of WPAN technology.- THROUGHPUT STUDY OF LOW-RATE COMMUNICATIONS.- Introduction.- Related Work.- Throughput Definition of WSN and WBAN.- Analysis of PEP.- The Proposed Scenarios.- Simulation Assumptions.- Simulation Results.- Chapter Recommendation.- WSN SECURITY NEEDS.- Introduction.- Security goals.- Fundamentals of Network Security.- Challenges of WSN Security.- WSN Implementation Technologies.- Summary.- LOWER COMPLEXITY OF SECURED WSN NETWORKS.- Power with FEC.- Complexity FEC dependant.- Interleaving Techniques.- Interleavers Investigation.- Chaotic Interleaver Structure.- Cryptography using Chaos.- Objective quality Metrics.- Jakes Method.- Mobility Effects.- Cooperative Algorithm of WSN.- Appendixes.
Introduction.- Wireless Network Overview.- Sensing Networks.- WSN Overview.- WBAN Overview.- WSN and Embedding System Relation.- Wireless Sensing Networks Contents.- .Wireless, Mobile, and Ad-hoc Networks.- .Book Organizing.- . SENSING AND ENVIRONMENT CONCEPTS.- Introduction.- Sensing Definition.- Environment Concepts.- WSN and Environment.- Environment and Medical Care Concerns.- WSNs and Sensors.- Sensing Examples.- WIRELESS NETWORKS.- Introduction.- Low-Rate Wireless Networks.- Bluetooth Networks Architecture.- Adaptive packets of WPAN technology.- THROUGHPUT STUDY OF LOW-RATE COMMUNICATIONS.- Introduction.- Related Work.- Throughput Definition of WSN and WBAN.- Analysis of PEP.- The Proposed Scenarios.- Simulation Assumptions.- Simulation Results.- Chapter Recommendation.- WSN SECURITY NEEDS.- Introduction.- Security goals.- Fundamentals of Network Security.- Challenges of WSN Security.- WSN Implementation Technologies.- Summary.- LOWER COMPLEXITY OF SECURED WSN NETWORKS.- Power with FEC.- Complexity FEC dependant.- Interleaving Techniques.- Interleavers Investigation.- Chaotic Interleaver Structure.- Cryptography using Chaos.- Objective quality Metrics.- Jakes Method.- Mobility Effects.- Cooperative Algorithm of WSN.- Appendixes.
Introduction.- Wireless Network Overview.- Sensing Networks.- WSN Overview.- WBAN Overview.- WSN and Embedding System Relation.- Wireless Sensing Networks Contents.- .Wireless, Mobile, and Ad-hoc Networks.- .Book Organizing.- . SENSING AND ENVIRONMENT CONCEPTS.- Introduction.- Sensing Definition.- Environment Concepts.- WSN and Environment.- Environment and Medical Care Concerns.- WSNs and Sensors.- Sensing Examples.- WIRELESS NETWORKS.- Introduction.- Low-Rate Wireless Networks.- Bluetooth Networks Architecture.- Adaptive packets of WPAN technology.- THROUGHPUT STUDY OF LOW-RATE COMMUNICATIONS.- Introduction.- Related Work.- Throughput Definition of WSN and WBAN.- Analysis of PEP.- The Proposed Scenarios.- Simulation Assumptions.- Simulation Results.- Chapter Recommendation.- WSN SECURITY NEEDS.- Introduction.- Security goals.- Fundamentals of Network Security.- Challenges of WSN Security.- WSN Implementation Technologies.- Summary.- LOWER COMPLEXITY OF SECURED WSN NETWORKS.- Power with FEC.- Complexity FEC dependant.- Interleaving Techniques.- Interleavers Investigation.- Chaotic Interleaver Structure.- Cryptography using Chaos.- Objective quality Metrics.- Jakes Method.- Mobility Effects.- Cooperative Algorithm of WSN.- Appendixes.