Paperback, [PU: LAP Lambert Academic Publishing], Security issues in Wireless sensor networks (WSNs) mainly come from attacks. In general, the attacks in WSNs can be classified as externa… Mehr…
Paperback, [PU: LAP Lambert Academic Publishing], Security issues in Wireless sensor networks (WSNs) mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area., Electrical Engineering<
Paperback, [PU: LAP LAMBERT Academic Publishing], Security issues in Wireless sensor networks (WSNs) mainly come from attacks. In general, the attacks in WSNs can be classified as externa… Mehr…
Paperback, [PU: LAP LAMBERT Academic Publishing], Security issues in Wireless sensor networks (WSNs) mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area., Electrical Engineering<
[ED: Kartoniert / Broschiert], [PU: LAP Lambert Academic Publishing], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Security issues in W… Mehr…
[ED: Kartoniert / Broschiert], [PU: LAP Lambert Academic Publishing], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Security issues in Wireless sensor networks (WSNs) mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal, DE, [SC: 0.00], Neuware, gewerbliches Angebot, Softcover, 108, [GW: 179g], Banküberweisung, PayPal<
booklooker.de
Moluna GmbH Versandkosten:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) Details...
(*) Derzeit vergriffen bedeutet, dass dieser Titel momentan auf keiner der angeschlossenen Plattform verfügbar ist.
Paperback, [PU: LAP Lambert Academic Publishing], Security issues in Wireless sensor networks (WSNs) mainly come from attacks. In general, the attacks in WSNs can be classified as externa… Mehr…
Paperback, [PU: LAP Lambert Academic Publishing], Security issues in Wireless sensor networks (WSNs) mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area., Electrical Engineering<
Paperback, [PU: LAP LAMBERT Academic Publishing], Security issues in Wireless sensor networks (WSNs) mainly come from attacks. In general, the attacks in WSNs can be classified as externa… Mehr…
Paperback, [PU: LAP LAMBERT Academic Publishing], Security issues in Wireless sensor networks (WSNs) mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area., Electrical Engineering<
[ED: Kartoniert / Broschiert], [PU: LAP Lambert Academic Publishing], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Security issues in W… Mehr…
[ED: Kartoniert / Broschiert], [PU: LAP Lambert Academic Publishing], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Security issues in Wireless sensor networks (WSNs) mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal, DE, [SC: 0.00], Neuware, gewerbliches Angebot, Softcover, 108, [GW: 179g], Banküberweisung, PayPal<
Versandkosten:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) Moluna GmbH
1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.
Detailangaben zum Buch - DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY
EAN (ISBN-13): 9783838302560 ISBN (ISBN-10): 3838302567 Gebundene Ausgabe Taschenbuch Erscheinungsjahr: 2009 Herausgeber: LAP Lambert Academic Publishing
Buch in der Datenbank seit 2009-11-21T01:22:10+01:00 (Zurich) Detailseite zuletzt geändert am 2023-04-19T17:05:27+02:00 (Zurich) ISBN/EAN: 9783838302560
ISBN - alternative Schreibweisen: 3-8383-0256-7, 978-3-8383-0256-0 Alternative Schreibweisen und verwandte Suchbegriffe: Titel des Buches: node, network security, compromise
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten: