02906nam 2200661 a 450 991045561890332120200520144314.01-282-75786-59786612757860981-4271-09-8(CKB)2490000000001670(EBL)1679353(OCoLC)670429880(SSID)ssj0000427889(PQKBManifestationID)12104319(PQKBTitleCode)TC0000427889(PQKBWorkID)10414368(PQKB)10018235(MiAaPQ)EBC1679353(WSP)00000543 (Au-PeEL)EBL1679353(CaPaEBR)ebr10422496(CaONFJC)MIL275786(EXLCZ)99249000000000167020101005d2010 uy 0engur|n|---|||||txtccrSecurity in ad hoc and sensor networks[electronic resource] /Raheem Beyah, Janise McNair, Cherita CorbettSingapore ;Hackensack, N.J. World Scientificc20101 online resource (419 p.)Series in computer and network security ;v. 3Description based upon print version of record.981-4271-08-X Includes bibliographical references.pt. 1. Authentication and confidentiality -- pt. 2. Privacy -- pt. 3. Reliability -- pt. 4. Network management and configuration. Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This completComputer and network security ;v. 3.Sensor networksSecurity measuresWireless communication systemsSecurity measuresComputer networksSecurity measuresElectronic books.Sensor networksSecurity measures.Wireless communication systemsSecurity measures.Computer networksSecurity measures.005.8Beyah Raheem(Raheem A.),1976-892972McNair Janise(Janise Yvette),1968-329824Corbett Cherita(Cherita L.)892973MiAaPQMiAaPQMiAaPQBOOK9910455618903321Security in ad hoc and sensor networks1994572UNINA