Ваш любимый книжный интернет-магазин
Перейти на
GlavKniga.SU
Ваш город: Алматы
Ваше местоположение – Алматы
 Да 
От вашего выбора зависит время и стоимость доставки
Корзина: пуста
Авторизация 
  Логин
  
  Пароль
  
Регистрация  Забыли пароль?

Поиск по каталогу 
(строгое соответствие)
ISBN
Фраза в названии или аннотации
Автор
Язык книги
Год издания
с по
Электронный носитель
Тип издания
Вид издания
Отрасли экономики
Отрасли знаний
Сферы деятельности
Надотраслевые технологии
Разделы каталога
худ. литературы

Secure Routing in Wireless Sensor Networks. Securing Wireless Communications

В наличии
Местонахождение: АлматыСостояние экземпляра: новый
Бумажная
версия
Автор: Jamil Ibriq
ISBN: 9783639519013
Год издания: 2013
Формат книги: 60×90/16 (145×215 мм)
Количество страниц: 104
Издательство: Scholars' Press
Цена: 34452 тг
Положить в корзину
Позиции в рубрикаторе
Отрасли знаний:
Код товара: 126942
Способы доставки в город Алматы *
комплектация (срок до отгрузки) не более 2 рабочих дней
Самовывоз из города Алматы (пункты самовывоза партнёра CDEK)
Курьерская доставка CDEK из города Москва
Доставка Почтой России из города Москва
      Аннотация: This research addresses communication security in wireless sensor networks by developing the Hierarchical Key Establishment Scheme (HIKES) which provides these networks with the basic security requirements and evaluating its effectiveness by implementing on an a routing platform. HIKES allows the central authority to empower sensors to issue secrets keys to local sensors for their communications. HIKES uses a novel key escrow scheme that enables any sensor node to represent the central authority to generate all the secret keys and authenticate other sensors. HIKES localizes secret key issuance, thereby reducing the communication overhead. The key escrow scheme provides HIKES with a large a addressing mechanism. HIKES also provides source and data authentication, and is robust against most known attacks. A hierarchical routing mechanism called Secure Hierarchical Energy-Efficient Routing protocol (SHEER) that implements HIKES is proposed. Simulations have shown that HIKES provides an energy-efficient and scalable solution to the key management problem. HIKES also has low storage, and high address flexibility. Simulations show that SHEER is energy-efficient and is scalable.
Ключевые слова: Key Management, Security in Wireless Sensor Networks, Schemes, Key Escrow Schemes, secure routing
Похожие издания
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Hardik M. Patel,Kirit Modi and Chirag Patel
Secure Routing in Wireless Sensor Network. Wireless Sensor Network.
1905 г.,  56 стр.,  мягкий переплет
Recent advances in wireless sensor networks (WSNs) have led to many new promising applications including habitat monitoring and target tracking. Secure Routing is one of the important issues in wireless sensor networks. Several approaches have been proposed for secure routing in wireless sensor networks, but there is a lack of sufficient support...

28391 тг
Бумажная версия
Отрасли знаний: Общественные науки -> Экономика
Hardik Patel
Intrusion detection in Secure Routing for Wireless Sensor Networks. Wireless Sensor Network.
1905 г.,  56 стр.,  мягкий переплет
Wireless Sensor Networks are widely used in various domains like military, habitat monitoring, medical monitoring for humans, environment monitoring in industries. Some applications of WSN are critical in nature and would have adverse effects as a result of intrusion. It is critical to detect and isolate the compromised nodes in order to avoid...

25002 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Manuj Mishra,Govind Sharma and Ram Pathak
Secure Routing In Wireless Mobile Ad Hoc Network. Detection of attack with secure routing.
2014 г.,  84 стр.,  мягкий переплет
Mobile Ad-hoc network (MANET) has become particularly vulnerable to intrusion, as they operate in open medium, and use cooperative strategies for network communications.We have used AODV routing protocol and we have make it more secure routing protocol and detected the black hole attack using last transmission time. Security of our approach is...

24061 тг
Бумажная версия