EUR 14,13
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbHardcover. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.08.
Verlag: Berlin : Springer, 2006
Sprache: Englisch
Anbieter: Antiquariat Thomas Haker GmbH & Co. KG, Berlin, Deutschland
Verbandsmitglied: GIAQ
Erstausgabe
EUR 23,40
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbHardcover. Zustand: Wie neu. 1st ed. 250 S.; Ill. Like new. Shrink wrapped. Sprache: Englisch Gewicht in Gramm: 655.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 141,34
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
EUR 154,08
Währung umrechnenAnzahl: 4 verfügbar
In den WarenkorbZustand: New. pp. 224 83 Illus.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 166,17
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
EUR 178,14
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbGebunden. Zustand: New. Includes example applications for target tracking, scientific exploration and data acquisition in hazardous environmentsIncludes a fairly new study on capabilities of mu-TESLA, a broadcast authentication technique for wireless sensor networks.
EUR 230,20
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 212 pages. 9.00x6.00x0.51 inches. In Stock.
EUR 247,94
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbBuch. Zustand: Neu. Neuware - The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monitor and report the conditions and events in their local environments. A large collection of these sensor nodes can thus form a wireless sensor network in an ad hoc manner, creating a new type of information systems. Such sensor networks have recently emerged as an important means to study and interact with the physical world and have received a lot of attention due to their wide applications in military and civilian operations such as target tracking and data acquisition. However, in many of these applications, wireless sensor networks could be deployed in hostile environments where there are malicious attacks against the network. Providing security services in sensor networks, however, turns out to be a very challenging task. First, sensor nodes usually have limited resources such as storage, bandwidth, computation and energy. It is often undesirable to implement expensive algorithms (e. g. , frequent public key operations) on sensor nodes. Second, sensor nodes are usually deployed unattended and built without compromise prevention in mind. An attacker can easily capture and compromise a few sensor nodes without being noticed. When sensor nodes are compromised, the attacker can learn all the secrets stored on them and launch a variety of attacks. Thus, any security mechanism for sensor networks has to be resilient to compromised sensor nodes.