eBooks-it.org Logo
eBooks-IT.org Inner Image

Secure Localization and Time Synchronization

For Wireless Sensor and Ad Hoc Networks

Secure Localization and Time Synchronization Image

Book Details:

Publisher:Springer
Series: Springer
Author:Radha Poovendran
Edition:1
ISBN-10:0387327215
ISBN-13:9780387327211
Pages:394
Published:Nov 14 2006
Posted:Jan 14 2015
Language:English
Book format:PDF
Book size:52.23 MB

Book Description:

This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor networks. It is suitable as a text for computer science courses in wireless systems and security. It includes implementation studies with mica2 mote sensors. Due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions. Hence the wireless network synchronization needs to be both robust and secure. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging. The book will also interest developers of secure wireless systems.

Download Link:

Related Books:

Secure Computer and Network Systems

Modeling, Analysis and Design
Secure Computer and Network Systems Image
Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, which threaten the security of, and present new challenges for protecting our assets and information on computer and network systems. The reliability of computer and network systems ultimately depends on security and quality of service (QoS) performance.This book presents quantitative modeling and analysis techniques to address these numerous challenges in cyber attack prevention and detection for security and QoS, including:the latest research on computer and...

Mobile Security

How to Secure, Privatize, and Recover Your Devices
Mobile Security Image
Keep your data secure on the go Overview Learn how mobile devices are monitored and the impact of cloud computing Understand the attacks hackers use and how to prevent them Keep yourself and your loved ones safe online In Detail The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be compromised if you dont manage your phone or mobile device correctly. Gain the power to manage all your mobile devices safely. With the help of this guide you can ensure that your data ...

Engineering Secure Software and Systems

7th International Symposium ESSoS 2015
Engineering Secure Software and Systems Image
This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Milan, Italy, in March 2015. The 11 full papers presented together with 5 short papers were carefully reviewed and selected from 41 submissions. The symposium features the following topics: formal methods; cloud passwords; machine learning; measurements ontologies; and access control....



2007 - 2021 © eBooks-IT.org