Skip to main content
Book cover

Security for Wireless Sensor Networks

  • Book
  • © 2007

Overview

  • Includes example applications for target tracking, scientific exploration and data acquisition in hazardous environments
  • Includes a fairly new study on capabilities of mu-TESLA, a broadcast authentication technique for wireless sensor networks
  • Includes investigation to enhance the security of location discovery in sensor networks

Part of the book series: Advances in Information Security (ADIS, volume 28)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (6 chapters)

Keywords

About this book

The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monitor and report the conditions and events in their local environments. A large collection of these sensor nodes can thus form a wireless sensor network in an ad hoc manner, creating a new type of information systems. Such sensor networks have recently emerged as an important means to study and interact with the physical world and have received a lot of attention due to their wide applications in military and civilian operations such as target tracking and data acquisition. However, in many of these applications, wireless sensor networks could be deployed in hostile environments where there are malicious attacks against the network. Providing security services in sensor networks, however, turns out to be a very challenging task. First, sensor nodes usually have limited resources such as storage, bandwidth, computation and energy. It is often undesirable to implement expensive algorithms (e. g. , frequent public key operations) on sensor nodes. Second, sensor nodes are usually deployed unattended and built without compromise prevention in mind. An attacker can easily capture and compromise a few sensor nodes without being noticed. When sensor nodes are compromised, the attacker can learn all the secrets stored on them and launch a variety of attacks. Thus, any security mechanism for sensor networks has to be resilient to compromised sensor nodes.

Reviews

From the reviews:

"Security for Wireless Sensor Networks provides a detailed overview of wireless sensor security issues, describing techniques for protecting networks and the results of recent studies in wireless sensor network security. Aimed at network security researchers and designers, this volume takes a high-level approach … . For its intended technically savvy readers, Security for Wireless Sensor Networks offers an excellent introductory text to wireless sensor security issues. … the text stands alone as the benchmark for wireless network security." (RFID Online, September, 2007)

"The primary focus of the book is to address the security challenges faced by sensor networks in a hostile environment … . ‘The purpose of this book is to help students and professionals to understand fundamental security issues and techniques for wireless sensor network security and prepare them for doing research in this domain.’ … As for professionals, this could be a good read, especially for those doing research in this area." (Phoram Mehta, ACM Computing Reviews, Vol. 49 (4), April, 2008)

Authors and Affiliations

  • Dept. Computer Science & Engineering, Univ. of Texas, Arlington, Arlington

    Donggang Liu

  • Dept. of Computer Science, North Carolina State University, Raleigh

    Peng Ning

Bibliographic Information

Publish with us