Security for Wireless Sensor Networks using Identity-Based Cryptography

Security for Wireless Sensor Networks using Identity-Based Cryptography
Author :
Publisher : CRC Press
Total Pages : 235
Release :
ISBN-10 : 9781466581265
ISBN-13 : 1466581263
Rating : 4/5 (263 Downloads)

Book Synopsis Security for Wireless Sensor Networks using Identity-Based Cryptography by : Harsh Kupwade Patil

Download or read book Security for Wireless Sensor Networks using Identity-Based Cryptography written by Harsh Kupwade Patil and published by CRC Press. This book was released on 2013-03-21 with total page 235 pages. Available in PDF, EPUB and Kindle. Book excerpt: Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN. Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.


Security for Wireless Sensor Networks using Identity-Based Cryptography Related Books

Security for Wireless Sensor Networks using Identity-Based Cryptography
Language: en
Pages: 235
Authors: Harsh Kupwade Patil
Categories: Computers
Type: BOOK - Published: 2013-03-21 - Publisher: CRC Press

GET EBOOK

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts
Wireless Algorithms, Systems, and Applications
Language: en
Pages: 854
Authors: Dongxiao Yu
Categories: Computers
Type: BOOK - Published: 2020-09-09 - Publisher: Springer Nature

GET EBOOK

The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2
Security, Privacy, and Anonymity in Computation, Communication, and Storage
Language: en
Pages: 522
Authors: Guojun Wang
Categories: Computers
Type: BOOK - Published: 2019-07-10 - Publisher: Springer

GET EBOOK

This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Stora
Identity-based Cryptography
Language: en
Pages: 272
Authors: Marc Joye
Categories: Computers
Type: BOOK - Published: 2009 - Publisher: IOS Press

GET EBOOK

"What if your public key was not some random-looking bit string, but simply your name or email address? This idea, put forward by Adi Shamir back in 1984, still
Information Technology Applications in Industry II
Language: en
Pages: 3318
Authors: Prasad Yarlagadda
Categories: Technology & Engineering
Type: BOOK - Published: 2013-09-03 - Publisher: Trans Tech Publications Ltd

GET EBOOK

Selected, peer reviewed papers from the 2013 2nd International Conference on Information Technology and Management Innovation (ICITMI 2013), July 23-24, 2013, Z