Security for Wireless Sensor Networks using Identity-Based Cryptography

Security for Wireless Sensor Networks using Identity-Based Cryptography
Author :
Publisher : CRC Press
Total Pages : 235
Release :
ISBN-10 : 9781466581265
ISBN-13 : 1466581263
Rating : 4/5 (263 Downloads)

Book Synopsis Security for Wireless Sensor Networks using Identity-Based Cryptography by : Harsh Kupwade Patil

Download or read book Security for Wireless Sensor Networks using Identity-Based Cryptography written by Harsh Kupwade Patil and published by CRC Press. This book was released on 2013-03-21 with total page 235 pages. Available in PDF, EPUB and Kindle. Book excerpt: Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN. Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.


Security for Wireless Sensor Networks using Identity-Based Cryptography Related Books

Security for Wireless Sensor Networks using Identity-Based Cryptography
Language: en
Pages: 235
Authors: Harsh Kupwade Patil
Categories: Computers
Type: BOOK - Published: 2013-03-21 - Publisher: CRC Press

DOWNLOAD EBOOK

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts
Identity-based Cryptography
Language: en
Pages: 272
Authors: Marc Joye
Categories: Computers
Type: BOOK - Published: 2009 - Publisher: IOS Press

DOWNLOAD EBOOK

"What if your public key was not some random-looking bit string, but simply your name or email address? This idea, put forward by Adi Shamir back in 1984, still
Information Technology Applications in Industry II
Language: en
Pages: 3318
Authors: Prasad Yarlagadda
Categories: Technology & Engineering
Type: BOOK - Published: 2013-09-03 - Publisher: Trans Tech Publications Ltd

DOWNLOAD EBOOK

Selected, peer reviewed papers from the 2013 2nd International Conference on Information Technology and Management Innovation (ICITMI 2013), July 23-24, 2013, Z
Security in Ad-hoc and Sensor Networks
Language: en
Pages: 239
Authors: Claude Castelluccia
Categories: Computers
Type: BOOK - Published: 2005-01-11 - Publisher: Springer

DOWNLOAD EBOOK

Ad hoc and sensor networks are making their way from research to real-world deployments. Body and personal-area networks, intelligent homes, environmental monit
Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government
Language: en
Pages: 1924
Authors: Management Association, Information Resources
Categories: Computers
Type: BOOK - Published: 2020-09-30 - Publisher: IGI Global

DOWNLOAD EBOOK

Even though blockchain technology was originally created as a ledger system for bitcoin to operate on, using it for areas other than cryptocurrency has become i