Authors:
- Covers several security mechanisms for Wireless Sensor Networks (WSN), while considering different attack levels
- Provides solutions for the node capture attack and clone attack at different attack levels
- Presents case studies throughout this book
- Includes supplementary material: sn.pub/extras
Part of the book series: Advances in Information Security (ADIS, volume 65)
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (7 chapters)
-
Front Matter
-
Back Matter
About this book
This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone attack.
It examines a number of areas and problems to which WSNs are applied continuously, including: supporting rescue operations, building surveillance, fire prevention, battlefield monitoring and more. However, known and unknown threats still affect WSNs and in many applications of this new technology the security of the network is a fundamental issue for confidentiality, integrity, authenticity and availability. The last section of the book addresses security for a common WSN service. Case studies are provided throughout.
Secure Wireless Sensor Networks: Threats and Solutions targets advanced-level students and researchers in computer science and electrical engineering as a secondary text book. Professionals working in the wireless sensor networks field will also find this book useful as a reference.
Â
Authors and Affiliations
-
Department of Mathematics, University of Padua, Padua, Italy
Mauro Conti
Bibliographic Information
Book Title: Secure Wireless Sensor Networks
Book Subtitle: Threats and Solutions
Authors: Mauro Conti
Series Title: Advances in Information Security
DOI: https://doi.org/10.1007/978-1-4939-3460-7
Publisher: Springer New York, NY
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Science+Business Media New York 2015
Hardcover ISBN: 978-1-4939-3458-4Published: 09 November 2015
Softcover ISBN: 978-1-4939-4751-5Published: 23 August 2016
eBook ISBN: 978-1-4939-3460-7Published: 06 November 2015
Series ISSN: 1568-2633
Series E-ISSN: 2512-2193
Edition Number: 1
Number of Pages: XIII, 169
Topics: Computer Communication Networks, Systems and Data Security, Communications Engineering, Networks, Cryptology