Security for wireless sensor networks using identity-based cryptography
Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Boca Raton :
CRC Press
2013.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628573906719 |
Tabla de Contenidos:
- Front Cover; Contents; Dedication; Foreword; Preface; Acknowledgments; About the Authors; Chapter 1: Introduction to Wireless Sensor Networks; Chapter 2: Security in Wireless Sensor Networks; Chapter 3: Elliptic Curve Cryptography; Chapter 4: Identity-Based Cryptography; Chapter 5: Identity-Based Authentication and Encryption in Wireless Sensor Networks; Chapter 6: Identity-Based Key Distribution in Wireless Sensor Networks; Chapter 7: Routing in Wireless Sensor Networks Using Identity-Based Cryptography; Chapter 8: Cross-Layer Security in Wireless Sensor Networks
- Chapter 9: Implementation of Elliptic Curve Cryptography in Wireless Sensor NetworksAppendix-For Further Reading