LEADER 02874nam 2200649 a 450 001 9910780731803321 005 20230725041504.0 010 $a1-282-75786-5 010 $a9786612757860 010 $a981-4271-09-8 035 $a(CKB)2490000000001670 035 $a(EBL)1679353 035 $a(OCoLC)670429880 035 $a(SSID)ssj0000427889 035 $a(PQKBManifestationID)12104319 035 $a(PQKBTitleCode)TC0000427889 035 $a(PQKBWorkID)10414368 035 $a(PQKB)10018235 035 $a(MiAaPQ)EBC1679353 035 $a(WSP)00000543 035 $a(Au-PeEL)EBL1679353 035 $a(CaPaEBR)ebr10422496 035 $a(CaONFJC)MIL275786 035 $a(EXLCZ)992490000000001670 100 $a20101005d2010 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity in ad hoc and sensor networks$b[electronic resource] /$fRaheem Beyah, Janise McNair, Cherita Corbett 210 $aSingapore ;$aHackensack, N.J. $cWorld Scientific$dc2010 215 $a1 online resource (419 p.) 225 1 $aSeries in computer and network security ;$vv. 3 300 $aDescription based upon print version of record. 311 $a981-4271-08-X 320 $aIncludes bibliographical references. 327 $apt. 1. Authentication and confidentiality -- pt. 2. Privacy -- pt. 3. Reliability -- pt. 4. Network management and configuration. 330 $a Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complet 410 0$aComputer and network security ;$vv. 3. 606 $aSensor networks$xSecurity measures 606 $aWireless communication systems$xSecurity measures 606 $aComputer networks$xSecurity measures 615 0$aSensor networks$xSecurity measures. 615 0$aWireless communication systems$xSecurity measures. 615 0$aComputer networks$xSecurity measures. 676 $a005.8 700 $aBeyah$b Raheem$g(Raheem A.),$f1976-$01484802 701 $aMcNair$b Janise$g(Janise Yvette),$f1968-$0329824 701 $aCorbett$b Cherita$g(Cherita L.)$01484803 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910780731803321 996 $aSecurity in ad hoc and sensor networks$93703592 997 $aUNINA