This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.
This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireles...
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities. Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practitioners in the field. Containing thirteen invited chapters from internationally recognized security experts, this volume details attacks, encryption, authentication, watermarking, key management, secure routing, and secure aggregation, location, and...
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These dif...
This rich and useful presentation of strategies for security issues covers each computing area in separate sections. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications.
This rich and useful presentation of strategies for security issues covers each computing area in separate sections. With more and more vital informat...
WiMAX is bringing about a worldwide revolution in broadband wireless access, including both fixed and mobile handsets. The IEEE 802.16 working group standardized most aspects of WiMAX signaling messages. However, several algorithms were left unspecified opening the door for innovations in protocol engineering for 802.16/802.20-based broadband wireless systems. Get Connected to the WiMAX Revolution WiMAX/MobileFi: Advanced Research and Technology brings together the world s leading WiMAX researchers to present progressive techniques in the design, analysis, and...
WiMAX is bringing about a worldwide revolution in broadband wireless access, including both fixed and mobile handsets. The IEEE 802.16 working group s...
The concept of medical treatment from a distance (in absentia care) is actually quite ancient, dating back to tribal days where smoke signals were used to warn of serious disease in a community. Nowadays, telemedicine is used to facilitate treatment in rural areas, where the nearest doctor is miles away, through various forms of information technology, including videoconferencing and digital imaging. It can also be used to conveniently monitor chronically ill patients through electronic devices so that they can enjoy a better quality of life. But despite the strides that have been made...
The concept of medical treatment from a distance (in absentia care) is actually quite ancient, dating back to tribal days where smoke signals w...
Fueled by ongoing and increasing consumer demand, the explosive growth in spectrum-based communications continues to tax the finite resources of the available spectrum. One possible solution, Cognitive Radio Network (CRN), allows unlicensed users opportunistic access to licensed bands without interfering with existing users. Although some initial study has been conducted in this field, researchers need a systematic reference book that presents clear definitions, functions, and current challenges of the CRNs. Cognitive Radio Networks presents state-of-the-art approaches and novel...
Fueled by ongoing and increasing consumer demand, the explosive growth in spectrum-based communications continues to tax the finite resources of th...
A detailed review of underwater channel characteristics, Underwater Acoustic Sensor Networks investigates the fundamental aspects of underwater communication. Prominent researchers from around the world consider contemporary challenges in the development of underwater acoustic sensor networks (UW-ASNs) and introduce a cross-layer approach for effective integration of all communication functionalities.
Discussing architectures for two- and three-dimensional sensor networks, this authoritative resource clearly delineates the main differences between...
A detailed review of underwater channel characteristics, Underwater Acoustic Sensor Networks investigates the fundamental aspects ...
Driven by the demand for high-data-rate, millimeter wave technologies with broad bandwidth are being explored in high-speed wireless communications. These technologies include gigabit wireless personal area networks (WPAN), high-speed wireless local area networks (WLAN), and high-speed wireless metropolitan area networks (WMAN). As a result of this technological push, standard organizations are actively calling for specifications of millimeter wave applications in the above wireless systems.
Providing the guidance needed to help you navigate through these new technologies, Millimeter...
Driven by the demand for high-data-rate, millimeter wave technologies with broad bandwidth are being explored in high-speed wireless communications. T...
This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style;...
This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recogniz...
Sensor networks have many interesting applications with great utility; however, their actually deployment and realization rely on continuous innovations and solutions to many challenging problems. Thus, sensor networks have recently attracted the attention of many researchers and practitioners. The compilation of the Handbook on Sensor Networks will meet the demand of the sensor network community for a comprehensive reference and summary of the current state of the area.
The Handbook on Sensor Networks is a collection of approximately 40 chapters on sensor network theory and applications....
Sensor networks have many interesting applications with great utility; however, their actually deployment and realization rely on continuous innovatio...