Security for Wireless Sensor Networks using Identity-Based Cryptography

Security for Wireless Sensor Networks using Identity-Based Cryptography

Author: Harsh Kupwade Patil

Publisher: CRC Press

Published: 2013-03-21

Total Pages: 235

ISBN-13: 1466581263

DOWNLOAD EBOOK

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN. Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.


Identity-based Cryptography

Identity-based Cryptography

Author: Marc Joye

Publisher: IOS Press

Published: 2009

Total Pages: 272

ISBN-13: 1586039474

DOWNLOAD EBOOK

"What if your public key was not some random-looking bit string, but simply your name or email address? This idea, put forward by Adi Shamir back in 1984, still keeps cryptographers busy today. Some cryptographic primitives, like signatures, were easily adapted to this new "identity-based" setting, but for others, including encryption, it was not until recently that the first practical solutions were found. The advent of pairings to cryptography caused a boom in the current state-of-the-art is this active subfield from the mathematical background of pairing and the main cryptographic constructions to software and hardware implementation issues. This volume bundles fourteen contributed chapters written by experts in the field, and is suitable for a wide audience of scientists, grad students, and implementors alike." --Book Jacket.


Computational Intelligence in Sensor Networks

Computational Intelligence in Sensor Networks

Author: Bijan Bihari Mishra

Publisher: Springer

Published: 2018-05-22

Total Pages: 496

ISBN-13: 366257277X

DOWNLOAD EBOOK

This book discusses applications of computational intelligence in sensor networks. Consisting of twenty chapters, it addresses topics ranging from small-scale data processing to big data processing realized through sensor nodes with the help of computational approaches. Advances in sensor technology and computer networks have enabled sensor networks to evolve from small systems of large sensors to large nets of miniature sensors, from wired communications to wireless communications, and from static to dynamic network topology. In spite of these technological advances, sensor networks still face the challenges of communicating and processing large amounts of imprecise and partial data in resource-constrained environments. Further, optimal deployment of sensors in an environment is also seen as an intractable problem. On the other hand, computational intelligence techniques like neural networks, evolutionary computation, swarm intelligence, and fuzzy systems are gaining popularity in solving intractable problems in various disciplines including sensor networks. The contributions combine the best attributes of these two distinct fields, offering readers a comprehensive overview of the emerging research areas and presenting first-hand experience of a variety of computational intelligence approaches in sensor networks.


Security in Ad-hoc and Sensor Networks

Security in Ad-hoc and Sensor Networks

Author: Claude Castelluccia

Publisher: Springer

Published: 2005-01-11

Total Pages: 239

ISBN-13: 3540304967

DOWNLOAD EBOOK

Ad hoc and sensor networks are making their way from research to real-world deployments. Body and personal-area networks, intelligent homes, environmental monitoring or inter-vehicle communications: there is almost nothing left that is not going to be smart and networked. While a great amount of research has been devoted to the pure networking aspects, ad hoc and sensor networks will not be successfully deployed if security, dependability, and privacy issues are not addressed adequately. As the first book devoted to the topic, this volume constitutes the thoroughly refereed post-proceedings of the First European Workshop on Security in Ad-hoc and Sensor Networks, ESAS, 2004, held in Heidelberg, Germany in August 2004. The 17 revised full papers were carefully reviewed and selected from 55 submissions. Among the key topics addressed are key distribution and management, authentication, energy-aware cryptographic primitives, anonymity and pseudonymity, secure diffusion, secure peer-to-peer overlays, and RFIDs.


Information Technology Applications in Industry II

Information Technology Applications in Industry II

Author: Prasad Yarlagadda

Publisher: Trans Tech Publications Ltd

Published: 2013-09-03

Total Pages: 3318

ISBN-13: 3038262455

DOWNLOAD EBOOK

Selected, peer reviewed papers from the 2013 2nd International Conference on Information Technology and Management Innovation (ICITMI 2013), July 23-24, 2013, Zhuhai, China


Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government

Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2020-09-30

Total Pages: 1924

ISBN-13: 1799853527

DOWNLOAD EBOOK

Even though blockchain technology was originally created as a ledger system for bitcoin to operate on, using it for areas other than cryptocurrency has become increasingly popular as of late. The transparency and security provided by blockchain technology is challenging innovation in a variety of businesses and is being applied in fields that include accounting and finance, supply chain management, and education. With the ability to perform such tasks as tracking fraud and securing the distribution of medical records, this technology is key to the advancement of many industries. The Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government is a vital reference source that examines the latest scholarly material on trends, techniques, and uses of blockchain technology applications in a variety of industries, and how this technology can further transparency and security. Highlighting a range of topics such as cryptography, smart contracts, and decentralized blockchain, this multi-volume book is ideally designed for academics, researchers, industry leaders, managers, healthcare professionals, IT consultants, engineers, programmers, practitioners, government officials, policymakers, and students.


Intrusion Detection in Wireless Ad-Hoc Networks

Intrusion Detection in Wireless Ad-Hoc Networks

Author: Nabendu Chaki

Publisher: CRC Press

Published: 2014-02-06

Total Pages: 246

ISBN-13: 1466515678

DOWNLOAD EBOOK

Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc


Network Security Technologies: Design and Applications

Network Security Technologies: Design and Applications

Author: Amine, Abdelmalek

Publisher: IGI Global

Published: 2013-11-30

Total Pages: 348

ISBN-13: 1466647906

DOWNLOAD EBOOK

Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested in improving their understanding of the strategic role of trust at different levels of information and knowledge society.


Wireless Sensor Network Security

Wireless Sensor Network Security

Author: Javier López

Publisher: IOS Press

Published: 2008

Total Pages: 320

ISBN-13: 1586038133

DOWNLOAD EBOOK

Wireless sensor networks (WSN) is especially vulnerable against external and internal attacks due to its particular characteristics. This book provides an overview of the major security issues that various WSN designers have to face, and also gives a comprehensive guide of solutions and open problems.


Cyber Security

Cyber Security

Author: M. U. Bokhari

Publisher: Springer

Published: 2018-04-27

Total Pages: 498

ISBN-13: 9811085366

DOWNLOAD EBOOK

This book comprises select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volume covers diverse topics ranging from information security to cryptography and from encryption to intrusion detection. This book focuses on Cyber Security. It aims at informing the readers about the technology in general and the internet in particular. The book uncovers the various nuances of information security, cyber security and its various dimensions. This book also covers latest security trends, ways to combat cyber threats including the detection and mitigation of security threats and risks. The contents of this book will prove useful to professionals and researchers alike.