|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910299194803321 |
|
|
Autore |
Conti Mauro |
|
|
Titolo |
Secure Wireless Sensor Networks : Threats and Solutions / / by Mauro Conti |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York, NY : , : Springer New York : , : Imprint : Springer, , 2015 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2015.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (180 p.) |
|
|
|
|
|
|
Collana |
|
Advances in Information Security, , 2512-2193 ; ; 65 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks |
Data protection |
Telecommunication |
Cryptography |
Data encryption (Computer science) |
Computer Communication Networks |
Data and Information Security |
Communications Engineering, Networks |
Cryptology |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Introduction -- Pair-wise key establishment -- Capture Detection -- Clone Detection -- Secure Data Aggregation -- Privacy in Data Aggregation -- Conclusions and Future Works. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone attack. It examines a number of areas and problems to which WSNs are applied continuously, including: supporting rescue operations, building surveillance, fire prevention, battlefield monitoring and more. However, known and unknown threats still affect WSNs and in many applications of this new technology the security of the network is a fundamental issue for confidentiality, integrity, authenticity and availability. The last |
|
|
|
|