02874nam 2200649 a 450 991078073180332120230725041504.01-282-75786-59786612757860981-4271-09-8(CKB)2490000000001670(EBL)1679353(OCoLC)670429880(SSID)ssj0000427889(PQKBManifestationID)12104319(PQKBTitleCode)TC0000427889(PQKBWorkID)10414368(PQKB)10018235(MiAaPQ)EBC1679353(WSP)00000543 (Au-PeEL)EBL1679353(CaPaEBR)ebr10422496(CaONFJC)MIL275786(EXLCZ)99249000000000167020101005d2010 uy 0engur|n|---|||||txtccrSecurity in ad hoc and sensor networks[electronic resource] /Raheem Beyah, Janise McNair, Cherita CorbettSingapore ;Hackensack, N.J. World Scientificc20101 online resource (419 p.)Series in computer and network security ;v. 3Description based upon print version of record.981-4271-08-X Includes bibliographical references.pt. 1. Authentication and confidentiality -- pt. 2. Privacy -- pt. 3. Reliability -- pt. 4. Network management and configuration. Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This completComputer and network security ;v. 3.Sensor networksSecurity measuresWireless communication systemsSecurity measuresComputer networksSecurity measuresSensor networksSecurity measures.Wireless communication systemsSecurity measures.Computer networksSecurity measures.005.8Beyah Raheem(Raheem A.),1976-1484802McNair Janise(Janise Yvette),1968-329824Corbett Cherita(Cherita L.)1484803MiAaPQMiAaPQMiAaPQBOOK9910780731803321Security in ad hoc and sensor networks3703592UNINA