Security for Wireless Sensor Networks Using Identity-Based Cryptography
BookThis item doesn’t have any media yet
2016 | Computing & IT
Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN. Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.
Related Items:
Published by | Taylor & Francis Ltd |
Edition | Unknown |
ISBN | 9781138199538 |
Language | N/A |
Images And Data Courtesy Of: Taylor & Francis Ltd.
This content (including text, images, videos and other media) is published and used in accordance
with Fair Use.