ISBN-13: 9781604564570 / Angielski / Twarda / 2009 / 382 str.
Reserving data authenticity in a hostile environment, where the sensor nodes may be compromised, is a critical security issue for wireless sensor networks. This book explains such attacks and that which can be roughly categorized as isolated attacks by eac