ABSTRACT
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.
Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practition
TABLE OF CONTENTS
part |2 pages
SECTION I: ATTACKS
part |2 pages
SECTION II: ENCRYPTION, AUTHENTICATION, AND WATERMARKING
part |2 pages
SECTION III: KEY MANAGEMENT
part |2 pages
SECTION IV: SECURE ROUTING
part |2 pages
SECTION V: SECURE AGGREGATION, LOCATION, AND CROSS-LAYER