Security for Wireless Sensor Networks Using Identity-Based Cryptography
BookThis item doesn’t have any media yet
2016 | Computing & IT
Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN. Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.
Related Items:
| Published by | Taylor & Francis Ltd | 
| Edition | Unknown | 
| ISBN | 9781138199538 | 
| Language | N/A | 
            
                                        Images And Data Courtesy Of: Taylor & Francis Ltd. 
                        This content (including text, images, videos and other media) is published and used in accordance
            with Fair Use.