Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security and privacy in smart sensor...
~
Maleh, Yassine, (1987-)
Linked to FindBook
Google Book
Amazon
博客來
Security and privacy in smart sensor networks
Record Type:
Electronic resources : Monograph/item
Title/Author:
Security and privacy in smart sensor networks/ Yassine Maleh, Abdellah Ezzati, and Mustapha Belaissaoui, editors.
other author:
Maleh, Yassine,
Published:
Hershey, Pennsylvania :IGI Global, : [2019],
Description:
1 online resource (xxii, 441 p.)
[NT 15003449]:
Section 1. Smart sensor protocols and cryptographic algorithms. Chapter 1. Key management protocols for smart sensor networks ; Chapter 2. Secure and energy-efficient routing for cluster-based wireless sensor networks ; Chapter 3. Trust management in vehicular Ad hoc network ; Chapter 4. An optimized reputation-based trust management scheme for MANET security ; Chapter 5. Trust management issues for sensors security and privacy in the smart grid -- Section 2. Security and privacy in the internet of things (IoT). Chapter 6. Security in the internet of things ; Chapter 7. Trust management in the internet of things ; Chapter 8. Security threats in the internet of things: RPL's attacks and countermeasures ; Chapter 9. IoT security based on content-centric networking architecture -- Section 3. Smart networks: access control and intrusion detection systems. Chapter 10. Network access control and collaborative security against APT and AET ; Chapter 11. A novel real-time lighting-invariant lane departure warning system ; Chapter 12. A review of intrusion detection systems in cloud computing ; Chapter 13. A secure routing scheme against malicious nodes in Ad hoc networks -- Section 4. Smart networks: security management and methods. Chapter 14. A state-of-the-art assessment of US and EU c-ITS security solutions ; Chapter 15. Security in 4G: IP multimedia subsystem (IMS) use case ; Chapter 16. Security of information exchange between readers and tags.
Subject:
Sensor networks - Security measures. -
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5736-4
ISBN:
9781522557371 (ebook)
Security and privacy in smart sensor networks
Security and privacy in smart sensor networks
[electronic resource] /Yassine Maleh, Abdellah Ezzati, and Mustapha Belaissaoui, editors. - Hershey, Pennsylvania :IGI Global,[2019] - 1 online resource (xxii, 441 p.)
Includes bibliographical references and index.
Section 1. Smart sensor protocols and cryptographic algorithms. Chapter 1. Key management protocols for smart sensor networks ; Chapter 2. Secure and energy-efficient routing for cluster-based wireless sensor networks ; Chapter 3. Trust management in vehicular Ad hoc network ; Chapter 4. An optimized reputation-based trust management scheme for MANET security ; Chapter 5. Trust management issues for sensors security and privacy in the smart grid -- Section 2. Security and privacy in the internet of things (IoT). Chapter 6. Security in the internet of things ; Chapter 7. Trust management in the internet of things ; Chapter 8. Security threats in the internet of things: RPL's attacks and countermeasures ; Chapter 9. IoT security based on content-centric networking architecture -- Section 3. Smart networks: access control and intrusion detection systems. Chapter 10. Network access control and collaborative security against APT and AET ; Chapter 11. A novel real-time lighting-invariant lane departure warning system ; Chapter 12. A review of intrusion detection systems in cloud computing ; Chapter 13. A secure routing scheme against malicious nodes in Ad hoc networks -- Section 4. Smart networks: security management and methods. Chapter 14. A state-of-the-art assessment of US and EU c-ITS security solutions ; Chapter 15. Security in 4G: IP multimedia subsystem (IMS) use case ; Chapter 16. Security of information exchange between readers and tags.
Restricted to subscribers or individual electronic text purchasers.
"This book explores current research on how to implement smart sensor networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, lightweight crypto and security solutions, authentication and intrusion detection"--
ISBN: 9781522557371 (ebook)Subjects--Topical Terms:
922407
Sensor networks
--Security measures.
LC Class. No.: TK7872.D48 / S425 2019e
Dewey Class. No.: 006.2/5
Security and privacy in smart sensor networks
LDR
:02746nmm a2200277 a 4500
001
2137964
003
IGIG
005
20181030160856.0
006
m o d
007
cr cn
008
181117s2019 pau fob 001 0 eng d
010
$z
2017055702
020
$a
9781522557371 (ebook)
020
$a
9781522557364 (hardcover)
035
$a
(OCoLC)1031311883
035
$a
1071025334
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
TK7872.D48
$b
S425 2019e
082
0 4
$a
006.2/5
$2
23
245
0 0
$a
Security and privacy in smart sensor networks
$h
[electronic resource] /
$c
Yassine Maleh, Abdellah Ezzati, and Mustapha Belaissaoui, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2019]
300
$a
1 online resource (xxii, 441 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Section 1. Smart sensor protocols and cryptographic algorithms. Chapter 1. Key management protocols for smart sensor networks ; Chapter 2. Secure and energy-efficient routing for cluster-based wireless sensor networks ; Chapter 3. Trust management in vehicular Ad hoc network ; Chapter 4. An optimized reputation-based trust management scheme for MANET security ; Chapter 5. Trust management issues for sensors security and privacy in the smart grid -- Section 2. Security and privacy in the internet of things (IoT). Chapter 6. Security in the internet of things ; Chapter 7. Trust management in the internet of things ; Chapter 8. Security threats in the internet of things: RPL's attacks and countermeasures ; Chapter 9. IoT security based on content-centric networking architecture -- Section 3. Smart networks: access control and intrusion detection systems. Chapter 10. Network access control and collaborative security against APT and AET ; Chapter 11. A novel real-time lighting-invariant lane departure warning system ; Chapter 12. A review of intrusion detection systems in cloud computing ; Chapter 13. A secure routing scheme against malicious nodes in Ad hoc networks -- Section 4. Smart networks: security management and methods. Chapter 14. A state-of-the-art assessment of US and EU c-ITS security solutions ; Chapter 15. Security in 4G: IP multimedia subsystem (IMS) use case ; Chapter 16. Security of information exchange between readers and tags.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book explores current research on how to implement smart sensor networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, lightweight crypto and security solutions, authentication and intrusion detection"--
$c
Provided by publisher.
650
0
$a
Sensor networks
$x
Security measures.
$3
922407
700
1
$a
Maleh, Yassine,
$d
1987-
$e
editor.
$3
3311014
700
1
$a
Ezzati, Abdellah,
$d
1966-
$e
editor.
$3
3311015
700
1
$a
Belaissaoui, Mustapha,
$d
1968-
$e
editor.
$3
3311016
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5736-4
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9344658
電子資源
11.線上閱覽_V
電子書
EB TK7872.D48 S425 2019e
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login