Secure localization and time synchronization for wireless sensor and ad hoc networks
Author(s)
Bibliographic Information
Secure localization and time synchronization for wireless sensor and ad hoc networks
(Advances in information security, 30)
Springer, c2007
Available at 2 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
Includes bibliographical references and index
Description and Table of Contents
Description
This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor networks. It is suitable as a text for computer science courses in wireless systems and security. It includes implementation studies with mica2 mote sensors. Due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions. Hence the wireless network synchronization needs to be both robust and secure. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging. The book will also interest developers of secure wireless systems.
Table of Contents
Localization Techniques.- Range-Free Localization.- A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks.- Learning Sensor Location from Signal Strength and Connectivity.- Node Localization Using Mobile Robots in Delay-Tolerant Sensor Networks.- Experiences from the Empirical Evaluation of Two Physical Layers for Node Localization.- Secure Localization.- Robust Wireless Localization: Attacks and Defenses.- Secure and Resilient Localization in Wireless Sensor Networks.- Secure Localization for Wireless Sensor Networks using Range-Independent Methods.- TRaVarSeL-Transmission Range Variation based Secure Localization.- Secure Sequence-based Localization for Wireless Networks.- Securing Localization in Wireless Networks (using Verifiable Multilateration and Covert Base Stations).- Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks.- Location Privacy in Wireless LAN.- Secure Time Synchronization.- Time Synchronization Attacks in Sensor Networks.- Secure and Resilient Time Synchronization in Wireless Sensor Networks.- Securing Timing Synchronization in Sensor Networks.
by "Nielsen BookData"