reorder
ALWAYS Be Happy search home
c
Combo Blog
Categories
Play Games New
Medien
Bücher
Books
Engineering
Springer Nature

Security For Wireless Sensor Networks

About The Providing security services in sensor networks, however, turns out to be a very challenging task. , frequent public key operations) on sensor nodes. Such sensor networks have recently emerged as an important means to study and interact with the physical world and have received a lot of attention due to their wide applications in military and civilian operations such as target tracking and data acquisition

First, sensor nodes usually have limited resources such as storage, bandwidth, computation and energy. When sensor nodes are compromised, the attacker can learn all the secrets stored on them and launch a variety of attacks. Thus, any security mechanism for sensor networks has to be resilient to compromised sensor nodes. Such sensor networks have recently emerged as an important means to study and interact with the physical world and have received a lot of attention due to their wide applications in military and civilian operations such as target tracking and data acquisition. Providing security services in sensor networks, however, turns out to be a very challenging task. It is often undesirable to implement expensive algorithms (e. The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monitor and report the conditions and events in their local environments. An attacker can easily capture and compromise a few sensor nodes without being noticed. Second, sensor nodes are usually deployed unattended and built without compromise prevention in mind. However, in many of these applications, wireless sensor networks could be deployed in hostile environments where there are malicious attacks against the network. g. A large collection of these sensor nodes can thus form a wireless sensor network in an ad hoc manner, creating a new type of information systems. , frequent public key operations) on sensor nodes.

Books > Engineering

Security For Wireless Sensor Networks

Books > Engineering

Specifications of Security For Wireless Sensor Networks

CategoryMedien > Bücher
Instockinstock

Last Updated

Security For Wireless Sensor Networks
More Varieties

Rating :- 9.54 /10
Votes :- 10