商家名称 | 信用等级 | 购买信息 | 订购本书 |
Security for Wireless Sensor Networks using Identity-Based Cryptography | |||
Security for Wireless Sensor Networks using Identity-Based Cryptography |
Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.
After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN.
Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.
网友对Security for Wireless Sensor Networks using Identity-Based Cryptography的评论
喜欢Security for Wireless Sensor Networks using Identity-Based Cryptography请与您的朋友分享,由于版权原因,读书人网不提供图书下载服务