This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor networks. It is suitable as a text for computer science courses in wireless systems and security. It includes implementation studies with mica2 mote sensors. Due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions. Hence the wireless network synchronization needs to be both robust and secure. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging. The...
This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor netw...
Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wireless sensor node or MANET devices need to know the network's location or its relative location, with respect to the rest of the network neighbors. However, due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions. Hence the wireless network synchronization needs to be both robust and secure. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging.
Secure Localization and Time...
Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wireless sensor node or MANET devices need to know the n...
This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014.
The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and...
This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in ...