Get Free Shipping on orders over $79
Security for Wireless Sensor Networks using Identity-Based Cryptography - Harsh Kupwade  Patil

Security for Wireless Sensor Networks using Identity-Based Cryptography

By: Harsh Kupwade Patil, Stephen A. Szygenda

Hardcover | 18 October 2012 | Edition Number 1

At a Glance

Hardcover


$528.75

or 4 interest-free payments of $132.19 with

 or 

Ships in 15 to 25 business days

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.

After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN.

Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.

Industry Reviews

" ... an excellent starting point for practitioners in the industry and students in academia faced with security issues in WSNs. It provides a comprehensive and systematic introduction to the fundamental concepts, major issues, and effective security solutions in wireless sensor networking."-IEEE Communications Magazine, October 2013

"Getting the right balance of systems security is a hard enough task in traditional networking, let alone securing a wireless network composed of sensors with high resource limitations that, nonetheless, can collaborate to perform complex tasks. This book serves as an excellent starting point for practitioners in the industry and students in academia to come up to speed with security issues in wireless sensor networks."
-
Vijay K. Gurbani, Ph.D., Distinguished Member of Technical Staff, Bell Laboratories, Alcatel-Lucent; Adjunct Professor, Department of Computer Science, Illinois Institute of Technology

"Strong identity mechanisms are a hard sell for today's Net because people feel that they know who they're talking to. In the Internet of Things with its focus on unfeeling machine-to-machine communications, we must replace 'feeling secure' with actually being secure. Wireless sensors are the eyes, ears, noses and cat-whiskers of the Internet of Things. Yet these sensors are connected by a network that can be subverted by hostile parties, risking that their output could be diverted or false information inserted. Given the vast number of sensors to be deployed, cryptographic identity systems may be the only manageable approach to trusting our senses."-Dean Willis, Chair, IETF SIP Working Group, 1999-2009

"... a valuable reference on IBC theory and practice that researchers and practitioners will want on their bookshelves for many years. In addition, it will certainly stimulate new directions in research in wireless network security." -Thomas M. Chen, Editor-in-Chief, IEEE Network, 2009-2011

More in Computer Security

Grey Area : Dark Web Data Collection and the Future of OSINT - Vinny Troia
Careless People : A story of where I used to work - Sarah Wynn-Williams

RRP $24.99

$21.75

13%
OFF
Computer Security : Art and Science - Dariel Wyatt
Foundations of Information Security - Liam Lewis
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Code Dependent : Living in the Shadow of AI - Madhumita Murgia

RRP $24.99

$21.75

13%
OFF
Mindf*ck : Inside Cambridge Analytica's Plot to Break the World - Profile Books
Crafting an Information Security Playbook - Brandon Enright

RRP $95.00

$43.75

54%
OFF
Hacking For Dummies : For Dummies (Computer/Tech) - Kevin Beaver

RRP $49.95

$38.75

22%
OFF
Principles of Information Security : 7th edition - Michael E. Whitman

RRP $167.95

$129.99

23%
OFF
Threat Modeling : A Practical Guide for Development Teams - Izar Tarandach
Hackers & Painters - Paul Graham

RRP $47.75

$26.75

44%
OFF