Security for wireless sensor networks using identity-based cryptography

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors...

Descripción completa

Detalles Bibliográficos
Autor principal: Patil, Harsh Kupwade (-)
Otros Autores: Szygenda, Stephen A.
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton : CRC Press 2013.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628573906719
Tabla de Contenidos:
  • Front Cover; Contents; Dedication; Foreword; Preface; Acknowledgments; About the Authors; Chapter 1: Introduction to Wireless Sensor Networks; Chapter 2: Security in Wireless Sensor Networks; Chapter 3: Elliptic Curve Cryptography; Chapter 4: Identity-Based Cryptography; Chapter 5: Identity-Based Authentication and Encryption in Wireless Sensor Networks; Chapter 6: Identity-Based Key Distribution in Wireless Sensor Networks; Chapter 7: Routing in Wireless Sensor Networks Using Identity-Based Cryptography; Chapter 8: Cross-Layer Security in Wireless Sensor Networks
  • Chapter 9: Implementation of Elliptic Curve Cryptography in Wireless Sensor NetworksAppendix-For Further Reading