語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security and privacy in smart sensor...
~
Belaissaoui, Mustapha, (1968-)
Security and privacy in smart sensor networks[electronic resource] /
紀錄類型:
書目-電子資源 : Monograph/item
杜威分類號:
006.2/5
書名/作者:
Security and privacy in smart sensor networks/ Yassine Maleh, Abdellah Ezzati, and Mustapha Belaissaoui, editors.
其他作者:
Maleh, Yassine,
出版者:
Hershey, Pennsylvania : : IGI Global,, [2019]
面頁冊數:
1 online resource (xxii, 441 p.)
標題:
Sensor networks - Security measures.
ISBN:
9781522557371 (ebook)
ISBN:
9781522557364 (hardcover)
書目註:
Includes bibliographical references and index.
內容註:
Section 1. Smart sensor protocols and cryptographic algorithms. Chapter 1. Key management protocols for smart sensor networks ; Chapter 2. Secure and energy-efficient routing for cluster-based wireless sensor networks ; Chapter 3. Trust management in vehicular Ad hoc network ; Chapter 4. An optimized reputation-based trust management scheme for MANET security ; Chapter 5. Trust management issues for sensors security and privacy in the smart grid -- Section 2. Security and privacy in the internet of things (IoT). Chapter 6. Security in the internet of things ; Chapter 7. Trust management in the internet of things ; Chapter 8. Security threats in the internet of things: RPL's attacks and countermeasures ; Chapter 9. IoT security based on content-centric networking architecture -- Section 3. Smart networks: access control and intrusion detection systems. Chapter 10. Network access control and collaborative security against APT and AET ; Chapter 11. A novel real-time lighting-invariant lane departure warning system ; Chapter 12. A review of intrusion detection systems in cloud computing ; Chapter 13. A secure routing scheme against malicious nodes in Ad hoc networks -- Section 4. Smart networks: security management and methods. Chapter 14. A state-of-the-art assessment of US and EU c-ITS security solutions ; Chapter 15. Security in 4G: IP multimedia subsystem (IMS) use case ; Chapter 16. Security of information exchange between readers and tags.
摘要、提要註:
"This book explores current research on how to implement smart sensor networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, lightweight crypto and security solutions, authentication and intrusion detection"--
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5736-4
Security and privacy in smart sensor networks[electronic resource] /
Security and privacy in smart sensor networks
[electronic resource] /Yassine Maleh, Abdellah Ezzati, and Mustapha Belaissaoui, editors. - Hershey, Pennsylvania :IGI Global,[2019] - 1 online resource (xxii, 441 p.)
Includes bibliographical references and index.
Section 1. Smart sensor protocols and cryptographic algorithms. Chapter 1. Key management protocols for smart sensor networks ; Chapter 2. Secure and energy-efficient routing for cluster-based wireless sensor networks ; Chapter 3. Trust management in vehicular Ad hoc network ; Chapter 4. An optimized reputation-based trust management scheme for MANET security ; Chapter 5. Trust management issues for sensors security and privacy in the smart grid -- Section 2. Security and privacy in the internet of things (IoT). Chapter 6. Security in the internet of things ; Chapter 7. Trust management in the internet of things ; Chapter 8. Security threats in the internet of things: RPL's attacks and countermeasures ; Chapter 9. IoT security based on content-centric networking architecture -- Section 3. Smart networks: access control and intrusion detection systems. Chapter 10. Network access control and collaborative security against APT and AET ; Chapter 11. A novel real-time lighting-invariant lane departure warning system ; Chapter 12. A review of intrusion detection systems in cloud computing ; Chapter 13. A secure routing scheme against malicious nodes in Ad hoc networks -- Section 4. Smart networks: security management and methods. Chapter 14. A state-of-the-art assessment of US and EU c-ITS security solutions ; Chapter 15. Security in 4G: IP multimedia subsystem (IMS) use case ; Chapter 16. Security of information exchange between readers and tags.
Restricted to subscribers or individual electronic text purchasers.
"This book explores current research on how to implement smart sensor networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, lightweight crypto and security solutions, authentication and intrusion detection"--
ISBN: 9781522557371 (ebook)Subjects--Topical Terms:
340757
Sensor networks
--Security measures.
LC Class. No.: TK7872.D48 / S425 2019e
Dewey Class. No.: 006.2/5
Security and privacy in smart sensor networks[electronic resource] /
LDR
:02746nmm a2200277 a 4500
001
512546
003
IGIG
005
20181030160856.0
006
m o d
007
cr cn
008
210927s2019 pau fob 001 0 eng d
010
$z
2017055702
020
$a
9781522557371 (ebook)
020
$a
9781522557364 (hardcover)
035
$a
(OCoLC)1031311883
035
$a
1071025334
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
TK7872.D48
$b
S425 2019e
082
0 4
$a
006.2/5
$2
23
245
0 0
$a
Security and privacy in smart sensor networks
$h
[electronic resource] /
$c
Yassine Maleh, Abdellah Ezzati, and Mustapha Belaissaoui, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2019]
300
$a
1 online resource (xxii, 441 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Section 1. Smart sensor protocols and cryptographic algorithms. Chapter 1. Key management protocols for smart sensor networks ; Chapter 2. Secure and energy-efficient routing for cluster-based wireless sensor networks ; Chapter 3. Trust management in vehicular Ad hoc network ; Chapter 4. An optimized reputation-based trust management scheme for MANET security ; Chapter 5. Trust management issues for sensors security and privacy in the smart grid -- Section 2. Security and privacy in the internet of things (IoT). Chapter 6. Security in the internet of things ; Chapter 7. Trust management in the internet of things ; Chapter 8. Security threats in the internet of things: RPL's attacks and countermeasures ; Chapter 9. IoT security based on content-centric networking architecture -- Section 3. Smart networks: access control and intrusion detection systems. Chapter 10. Network access control and collaborative security against APT and AET ; Chapter 11. A novel real-time lighting-invariant lane departure warning system ; Chapter 12. A review of intrusion detection systems in cloud computing ; Chapter 13. A secure routing scheme against malicious nodes in Ad hoc networks -- Section 4. Smart networks: security management and methods. Chapter 14. A state-of-the-art assessment of US and EU c-ITS security solutions ; Chapter 15. Security in 4G: IP multimedia subsystem (IMS) use case ; Chapter 16. Security of information exchange between readers and tags.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book explores current research on how to implement smart sensor networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, lightweight crypto and security solutions, authentication and intrusion detection"--
$c
Provided by publisher.
650
0
$a
Sensor networks
$x
Security measures.
$3
340757
700
1
$a
Maleh, Yassine,
$d
1987-
$e
editor.
$3
733181
700
1
$a
Ezzati, Abdellah,
$d
1966-
$e
editor.
$3
733182
700
1
$a
Belaissaoui, Mustapha,
$d
1968-
$e
editor.
$3
733183
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5736-4
筆 0 讀者評論
多媒體
多媒體檔案
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5736-4
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入