
From Problem to Solution
Format: Hardcover
ISBN13: 9781604564570
Hardcover|9781604564570
✨ Featured Offer
Used, Good
$117.51
List Price: $87.00
🚚
See all 1 offers from $117.51 FREE standard delivery by: 29 Mar 2026
Overview
Reserving data authenticity in a hostile environment, where the sensor nodes may be compromised, is a critical security issue for wireless sensor networks. In such networks, once a real event is detected, nearby sensors generate data reports which are subsequently forwarded to the data collection point. However, the subverted sensors, which have access to the stored secret keys, can launch attacks to compromise data authenticity. They can act as sources for forged reports and inject an unlimited number of bogus reports that fabricate false events "happening" at arbitrary locations in the field. Such false reports may exhaust network energy and bandwidth resources, trigger false alarms and undesired reactions. The authors explain such attacks and that which can be roughly categorised as isolated attacks by each individual compromised node or colluding attacks by a group of collaborating impostors.
| ISBN-13 | 9781604564570 |
|---|---|
| ISBN-10 | 1604564571 |
| Weight | 2.26 Pounds |
| Dimensions | 7.25 x 1.25 x 10.50 In |
| List Price | $87.00 |
| Format | Hardcover |
|---|---|
| Language | English |
| Pages | 382 pages |
| Publisher | Nova Science Pub Inc |
| Published On | 2008-07-01 |
View All Offers
Sort by:
Price
Condition
Seller
Seller Comments
Price
✨ Used, Good
Seller details
Bonita
Santa Clarita, CA, USA
Access codes and supplements are not guaranteed with used items. May be an ex-library book.
Free delivery by: 29 Mar 2026