LEADER 06794nam 2200673 450 001 9910145261303321 005 20221206101731.0 010 $a1-282-68998-3 010 $a9786612689987 010 $a0-470-51678-X 010 $a0-470-51677-1 024 7 $a10.1002/9780470516782 035 $a(CKB)1000000000707306 035 $a(EBL)416505 035 $a(SSID)ssj0000243257 035 $a(PQKBManifestationID)11188522 035 $a(PQKBTitleCode)TC0000243257 035 $a(PQKBWorkID)10321643 035 $a(PQKB)11331019 035 $a(MiAaPQ)EBC416505 035 $a(CaBNVSL)mat08039971 035 $a(IDAMS)0b00006485f0e051 035 $a(IEEE)8039971 035 $a(CaSebORM)9780470027486 035 $a(PPN)250927276 035 $a(OCoLC)352828344 035 $a(EXLCZ)991000000000707306 100 $a20171024d2008 uy 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity in wireless ad hoc and sensor networks /$fErdal #Caydrcd, Chunming Rong 205 $a1st edition 210 1$aChichester, U.K. :$cWiley,$dc2009. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2009] 215 $a1 online resource (283 p.) 300 $aDescription based upon print version of record. 311 $a0-470-02748-7 320 $aIncludes bibliographical references (p. [245]-252) and index. 327 $aAbout the Authors -- Preface -- Acknowledgements -- List of Acronyms -- Part One Wireless Ad Hoc, Sensor and Mesh Networking -- 1 Introduction -- 1.1 Information Security -- 1.2 Scope of the Book -- 1.3 Structure of the Book -- 1.4 Electronic Resources for the Book -- 1.5 Review Questions -- 2 Wireless Ad Hoc, Sensor and Mesh Networks -- 2.1 Ad Hoc Networks and Applications -- 2.2 Sensor and Actuator Networks -- 2.3 Mesh Networks. / -- 2.4 Tactical Communications and Networks -- 2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks -- .6 Review Questions -- 3 The Wireless Medium -- 3.1 Wireless Channel Fundamentals and Security -- 3.2 Advanced Radio Technologies -- 3.3 Review Questions -- 4 Medium Access and Error Control -- 4.1 Medium Access Control -- 4.2 Error Control -- 4.3 Wireless Metropolitan Area Networks -- 4.4 Wireless Local Area Networks -- 4.5 Wireless Personal Area Networks. / -- 4.6 Review Questions -- 5 Routing -- 5.1 Internet Protocol and Mobile IP -- 5.2 Routing in Wireless Ad Hoc Networks -- 5.3 Routing in Wireless Sensor and Actuator Networks -- 5.4 Review Questions -- 6 Reliability, Flow and Congestion Control -- 6.1 Reliability -- 6.2 Flow and Congestion Control -- 6.3 Review Questions -- 7 Other Challenges and Security Aspects -- 7.1 Localization and Positioning -- 7.2 Time Synchronization -- 7.3 Addressing -- 7.4 Data Aggregation and Fusion -- 7.5 Data Querying -- 7.6 Coverage -- 7.7 Mobility Management -- 7.8 Cross-layer Design -- 7.9 Review Questions -- Part Two Security in Wireless Ad Hoc, Sensor and Mesh Networking -- 8 Security Attacks in Ad Hoc, Sensor and Mesh Networks -- 8.1 Security Attacks -- 8.2 Attackers -- 8.3 Security Goals -- 8.4 Review Questions -- 9 Cryptography -- 9.1 Symmetric Encryption -- 9.2 Asymmetric Encryption -- 9.3 Hash Functions and Message Authentication Code -- 9.4 Cascading Hashing -- 9.5 Review Questions -- 10 Challenges and Solutions: Basic Issues -- 10.1 Bootstrapping Security in Ad Hoc Networks. 327 $a10.2 Bootstrapping Security in Sensor Networks -- 10.3 Key Distribution, Exchange and Management -- 10.4 Authentication Issues -- 10.5 Integrity -- 10.6 Review Questions -- 11 Challenges and Solutions: Protection -- 11.1 Privacy and Anonymity -- 11.2 Intrusion Detection -- 11.3 Defense Against Traffic Analysis -- 11.4 Access Control and Secure Human / Computer Interaction -- 11.5 Software-Based Anti-Tamper Techniques -- 11.6 Tamper Resilience: Hardware Protection -- 11.7 Availability and Plausibility -- 11.8 Review Questions -- 12 Secure Routing -- 12.1 Defense Against Security Attacks in Ad Hoc Routing -- 12.2 Secure Ad Hoc Routing Protocols -- 12.3 Further Reading -- 12.4 Review Questions -- 13 Specific Challenges and Solutions -- 13.1 SPINS: Security Protocols for Sensor Networks -- 13.2 Quarantine Region Scheme for Spam Attacks -- 13.3 Secure Charging and Rewarding Scheme -- 13.4 Secure Node Localization -- 13.5 Secure Time Synchronization -- 13.6 Secure Event and Event Boundary Detection -- 13.7 Review Questions -- 14 Information Operations and Electronic Warfare -- 14.1 Electronic Support -- 14.2 Electronic Attack -- 14.3 Electronic Protection -- 14.4 Review Questions -- 15 Standards -- 15.1 X.800 and RFC 2828 -- 15.2 Wired Equivalent Privacy (WEP) -- 15.3 Wi-Fi Protected Access (WPA) -- References -- Index. 330 $aThis book provides an in-depth guide to security in wireless ad hoc and sensor networks Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and counter measures in wireless ad hoc, sensor and mesh networks, and briefly presents the standards on related topics. The authors offer a clear exposition of various challenges and solutions in this field including bootstrapping, key distribution and exchange, authentication issues, privacy, anonymity and tamper resilience. Key Features: *Introduces the fundamentals and key issues of the new technologies followed by comprehensive presentation on security attacks and counter measures *Covers Denial of Service (DoS) attacks, hardware aspects of secure wireless ad hoc and sensor networks and secure routing *Contains information on cryptographic primitives and electronic warfare *Includes problems at the end of each chapter to enhance learning. This book is an invaluable resource for graduate students studying computer, electrical and communications engineering, researchers in academia and industry, and C4I engineers and officers in the military. Wireless network designers for internet service providers and mobile communications operators will also find this book very useful. 606 $aAd hoc networks (Computer networks)$xSecurity measures 606 $aComputer networks$xSecurity measures 615 0$aAd hoc networks (Computer networks)$xSecurity measures. 615 0$aComputer networks$xSecurity measures. 676 $a005.8 676 $a621.384 700 $a#Cayirci$b E.$g(Erdal)$0914574 701 $aRong$b Chunming$0941295 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910145261303321 996 $aSecurity in wireless ad hoc and sensor networks$92123148 997 $aUNINA LEADER 01035nam a2200265 i 4500 001 991001810129707536 005 20020502204834.0 008 971124s1994 ||| ||| | ||| 035 $ab10913907-39ule_inst 035 $aLE02377452$9ExL 040 $aDip.to Studi Storici$bita 082 0 $a945.5 100 1 $aCappelli, Vittorio$0139871 245 10$aStoria dell'Istituto d'Arte di Firenze, (1869-1989) /$ca cura Vittorio Cappelli e Simonetta Soldani 260 $aFirenze :$bOlschki,$c1994 300 $aLXII, 304 p., [22] p. di tav. :$bill. ;$c24 cm. 650 4$aFirenze - Istituto d'Arte$xStoria$y1869-1989 650 4$aIstituto d'Arte$xStoria 700 1 $aSoldani, Simonetta 907 $a.b10913907$b21-09-06$c28-06-02 912 $a991001810129707536 945 $aLE023 945.5 CAP 1 1$g1$i2023000040089$lle023$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i11018173$z28-06-02 996 $aStoria dell'Istituto d'Arte di Firenze, (1869-1989$9920558 997 $aUNISALENTO 998 $ale023$b01-01-97$cm$da $e-$feng$gxx $h0$i1 LEADER 03544nam 22005895 450 001 9910154753803321 005 20250625202007.0 010 $a9781400881505 010 $a1400881501 024 7 $a10.1515/9781400881505 035 $a(CKB)3710000000620067 035 $a(MiAaPQ)EBC4738516 035 $a(DE-B1597)467932 035 $a(OCoLC)979633635 035 $a(DE-B1597)9781400881505 035 $a(Perlego)736152 035 $a(EXLCZ)993710000000620067 100 $a20190708d2016 fg 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aFoundational Essays on Topological Manifolds, Smoothings, and Triangulations. (AM-88), Volume 88 /$fLaurence C. Siebenmann, Robion C. Kirby 210 1$aPrinceton, NJ :$cPrinceton University Press,$d[2016] 210 4$d©1977 215 $a1 online resource (373 pages) $cillustrations 225 0 $aAnnals of Mathematics Studies ;$v232 311 08$a9780691081915 311 08$a0691081913 311 08$a9780691081908 311 08$a0691081905 320 $aIncludes bibliographical references and index. 327 $tFrontmatter --$tForeword --$tTable of contents --$tGuide --$tEssay I. Deformation of smooth and piecewise linear manifold structures /$rKirby, R. / Siebenmann, L. --$tEssay II. Deformation of sliced families of manifold structures /$rSiebenmann, L. --$tEssay III. Some basic theorems about topological manifolds /$rSiebenmann, L. / Kirby, R. --$tEssay IV. Stable classification of smooth and piecewise linear manifold structures /$rSiebenmann, L. --$tEssay V. Classification of sliced families of manifold structures /$rSiebenmann, L. --$tAnnex A. Stable homeomorphisms and the annulus conjecture /$rKirby, Robion C. --$tAnnex B. On The Triangulation of Manifolds and the Hauptvermutung /$rKirby, R. C. / Siebenmann, L. C. --$tAnnex C. Topological Manifolds /$rSiebenmann, L. C. --$tNote on Involutions /$rAtiyah, M. F. --$tCombined Bibliography --$tIndex --$tBackmatter 330 $aSince Poincaré's time, topologists have been most concerned with three species of manifold. The most primitive of these--the TOP manifolds--remained rather mysterious until 1968, when Kirby discovered his now famous torus unfurling device. A period of rapid progress with TOP manifolds ensued, including, in 1969, Siebenmann's refutation of the Hauptvermutung and the Triangulation Conjecture. Here is the first connected account of Kirby's and Siebenmann's basic research in this area.The five sections of this book are introduced by three articles by the authors that initially appeared between 1968 and 1970. Appendices provide a full discussion of the classification of homotopy tori, including Casson's unpublished work and a consideration of periodicity in topological surgery. 410 0$aAnnals of mathematics studies ;$vNumber 88. 606 $aManifolds (Mathematics) 606 $aPiecewise linear topology 606 $aTriangulating manifolds 615 0$aManifolds (Mathematics) 615 0$aPiecewise linear topology. 615 0$aTriangulating manifolds. 676 $a514/.7 686 $aSI 830$2rvk 700 $aKirby$b Robion C.$0441130 702 $aSiebenmann$b Laurence C$g(Laurence Carl),$f1939- 801 0$bDE-B1597 801 1$bDE-B1597 906 $aBOOK 912 $a9910154753803321 996 $aFoundational Essays on Topological Manifolds, Smoothings, and Triangulations. (AM-88), Volume 88$92788040 997 $aUNINA