23,99 €
inkl. MwSt.

Versandfertig in 6-10 Tagen
  • Broschiertes Buch

Wireless sensor networks (WSNs) becoming popular nowadays due to the low-cost, unattended nature and the capability of self-organization of sensor nodes. Security is critical for many sensor network applications, such as military target tracking, weather monitoring and security monitoring. The deployment of sensors in a hostile environment and communication over the wireless medium, make the WSNs vulnerable to several types of attacks, like eavesdropping, Denial of Services (DoS) attacks, flooding and Sybil attack. Among these attacks, the node clone attack is a harmful attack, through which…mehr

Produktbeschreibung
Wireless sensor networks (WSNs) becoming popular nowadays due to the low-cost, unattended nature and the capability of self-organization of sensor nodes. Security is critical for many sensor network applications, such as military target tracking, weather monitoring and security monitoring. The deployment of sensors in a hostile environment and communication over the wireless medium, make the WSNs vulnerable to several types of attacks, like eavesdropping, Denial of Services (DoS) attacks, flooding and Sybil attack. Among these attacks, the node clone attack is a harmful attack, through which attacker compromises a node and then inject clones within the sensor networks. These clones perform various destructive operations, which obstructs the working of WSNs. The wireless sensor network requires robust mechanisms for the detection of node clone attack. This book presents security attacks classification for wireless sensor networks and the focus is given on the node clone attack. Analysis of various detection mechanisms for node clone attacks is also illustrated in this book.
Autorenporträt
Yashwant Singh est professeur associé au département CSE de la Jaypee University of Information Technology (JUIT), Waknaghat, Inde. Mme Vandana Mohindru est chercheuse en doctorat au département CSE de la JUIT. Les recherches de Yashwant et Vandana portent sur les réseaux de capteurs sans fil, les attaques de sécurité dans les réseaux de capteurs sans fil et le routage des réseaux de capteurs sans fil.