Reserving data authenticity in a hostile environment, where the sensor nodes may be compromised, is a critical security issue for wireless sensor networks. In such networks, once a real event is detected, nearby sensors generate data reports which are subsequently forwarded to the data collection point. However, the subverted sensors, which have access to the stored secret keys, can launch attacks to compromise data authenticity. They can act as sources for forged reports and inject an unlimited number of bogus reports that fabricate false events "happening" at arbitrary locations in the field. Such false reports may exhaust network energy and bandwidth resources, trigger false alarms and undesired reactions. The authors explain such attacks and that which can be roughly categorised as isolated attacks by each individual compromised node or colluding attacks by a group of collaborating impostors.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Basi6 International, Irving, TX, USA
Zustand: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Bestandsnummer des Verkäufers ABEOCT25-179403
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. pp. 382. Bestandsnummer des Verkäufers 5628342
Anzahl: 1 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Hardcover. Zustand: Brand New. 382 pages. 10.50x7.25x1.25 inches. In Stock. Bestandsnummer des Verkäufers zk1604564571
Anzahl: 1 verfügbar
Anbieter: BOOKIT!, Genève, Schweiz
Zustand: Used: Like New. LIVRE A L?ETAT DE NEUF. EXPEDIE SOUS 3 JOURS OUVRES. NUMERO DE SUIVI COMMUNIQUE AVANT ENVOI, EMBALLAGE RENFORCE. EAN:9781604564570. Bestandsnummer des Verkäufers SLIVCN-9781604564570
Anzahl: 1 verfügbar