Description |
1 online resource (xii, 406 pages) : illustrations. |
Series |
Series in computer and network security ; v. 3 |
|
Computer and network security ; v. 3.
|
Bibliography |
Includes bibliographical references. |
Contents |
pt. 1. Authentication and confidentiality -- part 2. Privacy -- part 3. Reliability -- part 4. Network management and configuration. |
Summary |
Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas. |
Note |
Print version record. |
Subject |
Sensor networks -- Security measures.
|
|
Wireless communication systems -- Security measures.
|
|
Computer networks -- Security measures.
|
|
TECHNOLOGY & ENGINEERING -- Electrical.
|
Added Author |
McNair, Janise (Janise Yvette), 1968-
|
|
Corbett, Cherita (Cherita L.)
|
Other Form: |
Print version: Beyah, Raheem (Raheem A.), 1976- Security in ad hoc and sensor networks. Singapore ; Hackensack, NJ : World Scientific, ©2010 9789814271080 (OCoLC)456137797 |
ISBN |
9789814271097 (electronic bk.) |
|
9814271098 (electronic bk.) |
|