This book introduces new cross-layer design approaches for wireless sensor networks using identity-based cryptography. It starts with a review of the existing layered approach and then examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the authors present a cross layer design approach to address authentication, integrity, and encryption. They also examine new ID-based key management mechanisms using a cross layer design perspective as well as secure routing and new intrusion detection techniques.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.