26,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
  • Broschiertes Buch

It is of paramount importance to have a mechanism of alienating any suspicious node from a network before it leads to any damage. In this form of attack which is popularly referred to as camouflage attack, the attacker first compromises an existing sensor node or inserts a malicious node with an intention of later using it. Once this node joins the network, it will exchange and route messages with the other nodes as a legitimate node, allowing the attacker to gather, modify or inject data.

Produktbeschreibung
It is of paramount importance to have a mechanism of alienating any suspicious node from a network before it leads to any damage. In this form of attack which is popularly referred to as camouflage attack, the attacker first compromises an existing sensor node or inserts a malicious node with an intention of later using it. Once this node joins the network, it will exchange and route messages with the other nodes as a legitimate node, allowing the attacker to gather, modify or inject data.
Autorenporträt
Benjamin holds BSc Computer Technology (1st Class Honors) from Kenya and a Masters degree in Computer Science and Engineering from Osmania University in India. His research interests are Cryptography and Computer Security, Networks, Algorithms Design and Implementation. He has published several research papers in these topics in refereed journals.