|Listed in category:
This item is out of stock.
Have one to sell?

Security in Wireless Ad Hoc and Sensor Networks

by Cayirci, Erdal; Rong, Chunming | HC | Good
Condition:
Good
Former library book; Pages can have notes/highlighting. Spine may show signs of wear. ~ ... Read moreabout condition
Price:
US $11.22
ApproximatelyS$ 15.12
Postage:
Free Economy Shipping. See detailsfor shipping
Located in: Aurora, Illinois, United States
Delivery:
Estimated between Tue, 11 Jun and Fri, 14 Jun to 43230
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the postage service selected, the seller's postage history, and other factors. Delivery times may vary, especially during peak periods.
Returns:
30 days return. Seller pays for return shipping. See details- for more information about returns
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)

Seller information

Registered as a Business Seller
Seller assumes all responsibility for this listing.
eBay item number:374990938406
Last updated on May 29, 2024 01:22:53 SGTView all revisionsView all revisions

Item specifics

Condition
Good
A book that has been read but is in good condition. Very minimal damage to the cover including scuff marks, but no holes or tears. The dust jacket for hard covers may not be included. Binding has minimal wear. The majority of pages are undamaged with minimal creasing or tearing, minimal pencil underlining of text, no highlighting of text, no writing in margins. No missing pages. See all condition definitionsopens in a new window or tab
Seller Notes
“Former library book; Pages can have notes/highlighting. Spine may show signs of wear. ~ ...
Binding
Hardcover
Weight
1 lbs
Product Group
Book
IsTextBook
No
ISBN
9780470027486
Subject Area
Computers, Technology & Engineering
Publication Name
Security in Wireless Ad Hoc and Sensor Networks
Item Length
9.9 in
Publisher
Wiley & Sons, Incorporated, John
Subject
Mobile & Wireless Communications, Networking / General, Security / Networking, Telecommunications
Publication Year
2009
Type
Textbook
Format
Trade Paperback
Language
English
Item Height
0.9 in
Author
Chunming Rong, Erdal Cayirci
Item Width
7 in
Item Weight
22 Oz
Number of Pages
280 Pages

About this product

Product Information

This advanced book is a comprehensive guide to security issues in wireless ad hoc and sensor networks.   The book is organized into two main sections. The first, gives an introduction to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security related issues.

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0470027487
ISBN-13
9780470027486
eBay Product ID (ePID)
60455820

Product Key Features

Author
Chunming Rong, Erdal Cayirci
Publication Name
Security in Wireless Ad Hoc and Sensor Networks
Format
Trade Paperback
Language
English
Subject
Mobile & Wireless Communications, Networking / General, Security / Networking, Telecommunications
Publication Year
2009
Type
Textbook
Subject Area
Computers, Technology & Engineering
Number of Pages
280 Pages

Dimensions

Item Length
9.9 in
Item Height
0.9 in
Item Width
7 in
Item Weight
22 Oz

Additional Product Features

LCCN
2008-041824
Intended Audience
Scholarly & Professional
Lc Classification Number
Tk5105.59
Table of Content
About the Authors. Preface. Acknowledgements. List of Acronyms. Part One Wireless Ad Hoc, Sensor and Mesh Networking. 1 Introduction. 1.1 Information Security. 1.2 Scope of the Book. 1.3 Structure of the Book. 1.4 Electronic Resources for the Book. 1.5 Review Questions. 2 Wireless Ad Hoc, Sensor and Mesh Networks. 2.1 Ad Hoc Networks and Applications. 2.2 Sensor and Actuator Networks. 2.3 Mesh Networks. 2.4 Tactical Communications and Networks. 2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks. .6 Review Questions. 3 The Wireless Medium. 3.1 Wireless Channel Fundamentals and Security. 3.2 Advanced Radio Technologies. 3.3 Review Questions. 4 Medium Access and Error Control. 4.1 Medium Access Control. 4.2 Error Control. 4.3 Wireless Metropolitan Area Networks. 4.4 Wireless Local Area Networks. 4.5 Wireless Personal Area Networks. 4.6 Review Questions. 5 Routing. 5.1 Internet Protocol and Mobile IP. 5.2 Routing in Wireless Ad Hoc Networks. 5.3 Routing in Wireless Sensor and Actuator Networks. 5.4 Review Questions. 6 Reliability, Flow and Congestion Control. 6.1 Reliability. 6.2 Flow and Congestion Control. 6.3 Review Questions. 7 Other Challenges and Security Aspects. 7.1 Localization and Positioning. 7.2 Time Synchronization. 7.3 Addressing. 7.4 Data Aggregation and Fusion. 7.5 Data Querying. 7.6 Coverage. 7.7 Mobility Management. 7.8 Cross-layer Design. 7.9 Review Questions. Part Two Security in Wireless Ad Hoc, Sensor and Mesh Networking. 8 Security Attacks in Ad Hoc, Sensor and Mesh Networks. 8.1 Security Attacks. 8.2 Attackers. 8.3 Security Goals. 8.4 Review Questions. 9 Cryptography. 9.1 Symmetric Encryption. 9.2 Asymmetric Encryption. 9.3 Hash Functions and Message Authentication Code. 9.4 Cascading Hashing. 9.5 Review Questions. 10 Challenges and Solutions: Basic Issues. 10.1 Bootstrapping Security in Ad Hoc Networks. 10.2 Bootstrapping Security in Sensor Networks. 10.3 Key Distribution, Exchange and Management. 10.4 Authentication Issues. 10.5 Integrity. 10.6 Review Questions. 11 Challenges and Solutions: Protection. 11.1 Privacy and Anonymity. 11.2 Intrusion Detection. 11.3 Defense Against Traffic Analysis. 11.4 Access Control and Secure Human-Computer Interaction. 11.5 Software-Based Anti-Tamper Techniques. 11.6 Tamper Resilience: Hardware Protection. 11.7 Availability and Plausibility. 11.8 Review Questions. 12 Secure Routing. 12.1 Defense Against Security Attacks in Ad Hoc Routing. 12.2 Secure Ad Hoc Routing Protocols. 12.3 Further Reading. 12.4 Review Questions. 13 Specific Challenges and Solutions. 13.1 SPINS: Security Protocols for Sensor Networks. 13.2 Quarantine Region Scheme for Spam Attacks. 13.3 Secure Charging and Rewarding Scheme. 13.4 Secure Node Localization. 13.5 Secure Time Synchronization. 13.6 Secure Event and Event Boundary Detection. 13.7 Review Questions. 14 Information Operations and Electronic Warfare. 14.1 Electronic Support. 14.2 Electronic Attack. 14.3 Electronic Protection. 14.4 Review Questions. 15 Standards. 15.1 X.800 and RFC 2828. 15.2 Wired Equivalent Privacy (WEP). 15.3 Wi-Fi Protected Access (WPA). References. Index.
Copyright Date
2008
Illustrated
Yes

Item description from the seller

ThriftBooks

ThriftBooks

99% positive feedback
17.7M items sold
Usually responds within 24 hours

Detailed Seller Ratings

Average for the last 12 months

Accurate description
4.9
Reasonable shipping cost
5.0
Shipping speed
5.0
Communication
4.9

Seller feedback (5,209,169)

g***9 (3)- Feedback left by buyer.
Past month
Verified purchase
Good product
g***9 (3)- Feedback left by buyer.
Past month
Verified purchase
Good product
g***9 (3)- Feedback left by buyer.
Past month
Verified purchase
Good product