Wireless sensor networks (WSNs) becoming popular nowadays due to the low-cost, unattended nature and the capability of self-organization of sensor nodes. Security is critical for many sensor network applications, such as military target tracking, weather monitoring and security monitoring. The deployment of sensors in a hostile environment and communication over the wireless medium, make the WSNs vulnerable to several types of attacks, like eavesdropping, Denial of Services (DoS) attacks, flooding and Sybil attack. Among these attacks, the node clone attack is a harmful attack, through which attacker compromises a node and then inject clones within the sensor networks. These clones perform various destructive operations, which obstructs the working of WSNs. The wireless sensor network requires robust mechanisms for the detection of node clone attack. This book presents security attacks classification for wireless sensor networks and the focus is given on the node clone attack. Analysis of various detection mechanisms for node clone attacks is also illustrated in this book.
"synopsis" may belong to another edition of this title.
Dr.Yashwant Singh is Associate Professor in the Department of CSE at Jaypee University of Information Technology (JUIT), Waknaghat, India. Mrs.Vandana Mohindru is Ph. D. Research Scholar at the Department of CSE at JUIT. Yashwant and Vandana's research interest lies in Wireless Sensor Networks, Security Attacks in WSN and Routing WSN.
"About this title" may belong to another edition of this title.
£ 9.20 shipping from Germany to United Kingdom
Destination, rates & speedsSeller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Wireless sensor networks (WSNs) becoming popular nowadays due to the low-cost, unattended nature and the capability of self-organization of sensor nodes. Security is critical for many sensor network applications, such as military target tracking, weather monitoring and security monitoring. The deployment of sensors in a hostile environment and communication over the wireless medium, make the WSNs vulnerable to several types of attacks, like eavesdropping, Denial of Services (DoS) attacks, flooding and Sybil attack. Among these attacks, the node clone attack is a harmful attack, through which attacker compromises a node and then inject clones within the sensor networks. These clones perform various destructive operations, which obstructs the working of WSNs. The wireless sensor network requires robust mechanisms for the detection of node clone attack. This book presents security attacks classification for wireless sensor networks and the focus is given on the node clone attack. Analysis of various detection mechanisms for node clone attacks is also illustrated in this book. 64 pp. Englisch. Seller Inventory # 9783659806247
Quantity: 2 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Wireless sensor networks (WSNs) becoming popular nowadays due to the low-cost, unattended nature and the capability of self-organization of sensor nodes. Security is critical for many sensor network applications, such as military target tracking, weather monitoring and security monitoring. The deployment of sensors in a hostile environment and communication over the wireless medium, make the WSNs vulnerable to several types of attacks, like eavesdropping, Denial of Services (DoS) attacks, flooding and Sybil attack. Among these attacks, the node clone attack is a harmful attack, through which attacker compromises a node and then inject clones within the sensor networks. These clones perform various destructive operations, which obstructs the working of WSNs. The wireless sensor network requires robust mechanisms for the detection of node clone attack. This book presents security attacks classification for wireless sensor networks and the focus is given on the node clone attack. Analysis of various detection mechanisms for node clone attacks is also illustrated in this book. Seller Inventory # 9783659806247
Quantity: 1 available
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Singh YashwantDr.Yashwant Singh is Associate Professor in the Department of CSE at Jaypee University of Information Technology (JUIT), Waknaghat, India. Mrs.Vandana Mohindru is Ph. D. Research Scholar at the Department of CSE at JUIT. Seller Inventory # 158876815
Quantity: Over 20 available
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 64 pages. 8.66x5.91x0.15 inches. In Stock. Seller Inventory # 3659806242
Quantity: 1 available
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. Neuware -Wireless sensor networks (WSNs) becoming popular nowadays due to the low-cost, unattended nature and the capability of self-organization of sensor nodes. Security is critical for many sensor network applications, such as military target tracking, weather monitoring and security monitoring. The deployment of sensors in a hostile environment and communication over the wireless medium, make the WSNs vulnerable to several types of attacks, like eavesdropping, Denial of Services (DoS) attacks, flooding and Sybil attack. Among these attacks, the node clone attack is a harmful attack, through which attacker compromises a node and then inject clones within the sensor networks. These clones perform various destructive operations, which obstructs the working of WSNs. The wireless sensor network requires robust mechanisms for the detection of node clone attack. This book presents security attacks classification for wireless sensor networks and the focus is given on the node clone attack. Analysis of various detection mechanisms for node clone attacks is also illustrated in this book.Books on Demand GmbH, Überseering 33, 22297 Hamburg 64 pp. Englisch. Seller Inventory # 9783659806247
Quantity: 2 available