Taylor & Francis GroupTaylor & Francis Group
Search all titles
  • Login
  • Hi, User  
    • Your Account
    • Logout
  • Search all titles
  • Search all collections
Security for Wireless Sensor Networks using Identity-Based Cryptography
loading
Security for Wireless Sensor Networks using Identity-Based Cryptography

Security for Wireless Sensor Networks using Identity-Based Cryptography

ByHarsh Kupwade Patil, Stephen A. Szygenda
Edition 1st Edition
First Published 2012
eBook Published 18 October 2012
Pub. location New York
Imprint Auerbach Publications
DOIhttps://doi.org/10.1201/b13080
Pages 232 pages
eBook ISBN 9781439869024
SubjectsComputer Science, Engineering & Technology, Mathematics & Statistics
Get Citation

Get Citation

Patil, H., Szygenda, S. (2013). Security for Wireless Sensor Networks using Identity-Based Cryptography. New York: Auerbach Publications, https://doi.org/10.1201/b13080
ABOUT THIS BOOK

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.Aft

TABLE OF CONTENTS
chapter 1|18 pages
Introduction to Wireless Sensor Networks
View abstract
chapter 2|14 pages
Security in Wireless Sensor Networks
View abstract
chapter 3|24 pages
Elliptic Curve Cryptography
View abstract
chapter 4|36 pages
Identity-Based Cryptography
View abstract
chapter 5|22 pages
Identity-Based Authentication and Encryption in Wireless Sensor Networks
View abstract
chapter 6|20 pages
Identity-Based Key Distribution in Wireless Sensor Networks
View abstract
chapter 7|24 pages
Routing in Wireless Sensor Networks Using Identity-Based Cryptography
View abstract
chapter 8|14 pages
Cross-Layer Security in Wireless Sensor Networks
View abstract
chapter 9|30 pages
Implementation of Elliptic Curve Cryptography in Wireless Sensor Networks
View abstract

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.Aft

TABLE OF CONTENTS
chapter 1|18 pages
Introduction to Wireless Sensor Networks
View abstract
chapter 2|14 pages
Security in Wireless Sensor Networks
View abstract
chapter 3|24 pages
Elliptic Curve Cryptography
View abstract
chapter 4|36 pages
Identity-Based Cryptography
View abstract
chapter 5|22 pages
Identity-Based Authentication and Encryption in Wireless Sensor Networks
View abstract
chapter 6|20 pages
Identity-Based Key Distribution in Wireless Sensor Networks
View abstract
chapter 7|24 pages
Routing in Wireless Sensor Networks Using Identity-Based Cryptography
View abstract
chapter 8|14 pages
Cross-Layer Security in Wireless Sensor Networks
View abstract
chapter 9|30 pages
Implementation of Elliptic Curve Cryptography in Wireless Sensor Networks
View abstract
CONTENTS
ABOUT THIS BOOK

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.Aft

TABLE OF CONTENTS
chapter 1|18 pages
Introduction to Wireless Sensor Networks
View abstract
chapter 2|14 pages
Security in Wireless Sensor Networks
View abstract
chapter 3|24 pages
Elliptic Curve Cryptography
View abstract
chapter 4|36 pages
Identity-Based Cryptography
View abstract
chapter 5|22 pages
Identity-Based Authentication and Encryption in Wireless Sensor Networks
View abstract
chapter 6|20 pages
Identity-Based Key Distribution in Wireless Sensor Networks
View abstract
chapter 7|24 pages
Routing in Wireless Sensor Networks Using Identity-Based Cryptography
View abstract
chapter 8|14 pages
Cross-Layer Security in Wireless Sensor Networks
View abstract
chapter 9|30 pages
Implementation of Elliptic Curve Cryptography in Wireless Sensor Networks
View abstract

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.Aft

TABLE OF CONTENTS
chapter 1|18 pages
Introduction to Wireless Sensor Networks
View abstract
chapter 2|14 pages
Security in Wireless Sensor Networks
View abstract
chapter 3|24 pages
Elliptic Curve Cryptography
View abstract
chapter 4|36 pages
Identity-Based Cryptography
View abstract
chapter 5|22 pages
Identity-Based Authentication and Encryption in Wireless Sensor Networks
View abstract
chapter 6|20 pages
Identity-Based Key Distribution in Wireless Sensor Networks
View abstract
chapter 7|24 pages
Routing in Wireless Sensor Networks Using Identity-Based Cryptography
View abstract
chapter 8|14 pages
Cross-Layer Security in Wireless Sensor Networks
View abstract
chapter 9|30 pages
Implementation of Elliptic Curve Cryptography in Wireless Sensor Networks
View abstract
ABOUT THIS BOOK
ABOUT THIS BOOK

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.Aft

TABLE OF CONTENTS
chapter 1|18 pages
Introduction to Wireless Sensor Networks
View abstract
chapter 2|14 pages
Security in Wireless Sensor Networks
View abstract
chapter 3|24 pages
Elliptic Curve Cryptography
View abstract
chapter 4|36 pages
Identity-Based Cryptography
View abstract
chapter 5|22 pages
Identity-Based Authentication and Encryption in Wireless Sensor Networks
View abstract
chapter 6|20 pages
Identity-Based Key Distribution in Wireless Sensor Networks
View abstract
chapter 7|24 pages
Routing in Wireless Sensor Networks Using Identity-Based Cryptography
View abstract
chapter 8|14 pages
Cross-Layer Security in Wireless Sensor Networks
View abstract
chapter 9|30 pages
Implementation of Elliptic Curve Cryptography in Wireless Sensor Networks
View abstract

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.Aft

TABLE OF CONTENTS
chapter 1|18 pages
Introduction to Wireless Sensor Networks
View abstract
chapter 2|14 pages
Security in Wireless Sensor Networks
View abstract
chapter 3|24 pages
Elliptic Curve Cryptography
View abstract
chapter 4|36 pages
Identity-Based Cryptography
View abstract
chapter 5|22 pages
Identity-Based Authentication and Encryption in Wireless Sensor Networks
View abstract
chapter 6|20 pages
Identity-Based Key Distribution in Wireless Sensor Networks
View abstract
chapter 7|24 pages
Routing in Wireless Sensor Networks Using Identity-Based Cryptography
View abstract
chapter 8|14 pages
Cross-Layer Security in Wireless Sensor Networks
View abstract
chapter 9|30 pages
Implementation of Elliptic Curve Cryptography in Wireless Sensor Networks
View abstract
Taylor & Francis Group
Policies
  • Privacy Policy
  • Terms & Conditions
  • Cookie Policy
Journals
  • Taylor & Francis Online
  • CogentOA
Corporate
  • Taylor & Francis
    Group
  • Taylor & Francis Group
Help & Contact
  • Students/Researchers
  • Librarians/Institutions

Connect with us

Registered in England & Wales No. 3099067
5 Howick Place | London | SW1P 1WG © 2018 Informa UK Limited