Wireless Sensor Networks (WSN) are difficult to deploy. Limited energy, bandwidth, hardware and lack of security make WSN implementation difficult. Conventional security mechanisms cannot be applied because of the inherent processing and communicational constraints that exist in WSN. This book focuses on the design, implementation and analysis of an Optimized Security Protocol (OSP) that fulfills the requirements of confidentiality, authentication and integrity in WSN. OSP fulfils requirements of high level security without compromising resources. OSP architecture is based on the further...
Wireless Sensor Networks (WSN) are difficult to deploy. Limited energy, bandwidth, hardware and lack of security make WSN implementation difficult. Co...