• +353-1-415-1241(GMT OFFICE HOURS)
  • 1-800-526-8630(US/CAN TOLL FREE)
  • 1-917-300-0470(EST OFFICE HOURS)

This product is currently not available for purchase.

RELATED PRODUCTS

DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK  SECURITY. Edition No. 1 - Product Image

DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. Edition No. 1

  • Published: June 2009
  • Region: Global
  • 108 Pages
  • VDM Publishing House

Security issues in Wireless sensor networks (WSNs) mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area.

Xiangqian, Chen.
Xiangqian Chen received the PhD degree in Electrical and Computer Engineering from Florida International University in December 2007. His current research interests include wireless

Note: Product cover images may vary from those shown

Our Clients

Our clients' logos