Security in RFID and Sensor Networks
商品資訊
ISBN13:9781420068399
出版社:Auerbach Pub UK
作者:Yan Zhang (EDT); Paris Kitsos (EDT)
出版日:2009/04/13
裝訂/頁數:精裝/560頁
定價
:NT$ 7800 元優惠價
:
90 折 7020 元
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
商品簡介
目次
商品簡介
In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing. As always, adequate security remains one of the open areas of concern before wide deployment of RFID and WSNs can be achieved. Security in RFID and Sensor Networks is the first book to offer a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and integrated RFID and WSNs, providing an essential reference for those who regularly interface with these versatile technologies.
Exposes Security Risks
The book begins with a discussion of current security issues that threaten the effective use of RFID technology. The contributors examine multi-tag systems, relay attacks, authentication protocols, lightweight cryptography, and host of other topics related to RFID safety. The book then shifts the focus to WSNs, beginning with a background in sensor network security before moving on to survey intrusion detection, malicious node detection, jamming, and other issues of concern to WSNs and their myriad of applications.
Offers Viable Solutions
In each chapter, the contributors propose effective solutions to the plethora of security challenges that confront users, offering practical examples to aid in intuitive understanding. The last part of the book reviews the security problems inherent in integrated RFID & WSNs. The book ends with a glimpse of the future possibilities in these burgeoning technologies and provides recommendations for the proactive design of secure wireless embedded systems.
Exposes Security Risks
The book begins with a discussion of current security issues that threaten the effective use of RFID technology. The contributors examine multi-tag systems, relay attacks, authentication protocols, lightweight cryptography, and host of other topics related to RFID safety. The book then shifts the focus to WSNs, beginning with a background in sensor network security before moving on to survey intrusion detection, malicious node detection, jamming, and other issues of concern to WSNs and their myriad of applications.
Offers Viable Solutions
In each chapter, the contributors propose effective solutions to the plethora of security challenges that confront users, offering practical examples to aid in intuitive understanding. The last part of the book reviews the security problems inherent in integrated RFID & WSNs. The book ends with a glimpse of the future possibilities in these burgeoning technologies and provides recommendations for the proactive design of secure wireless embedded systems.
目次
Security in RFID
Multi-Tag RFID Systems, L. Bolotnyy and G. Robins
Attacking RFID Systems, P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda
RFID Relay Attacks: System Analysis,Modeling, and Implementation, A. Lima, A. Miri, and M. Nevins
Physical Privacy and Security in RFID Systems, L. Bolotnyy and G. Robins
Authentication Protocols in RFID Systems, G. Pantelic, S. Bojanic, and V. Tomaševic
Lightweight Cryptography for Low-Cost RFID Tags, P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda
Distance-Bounding Protocols for RFID, J.M. Fajardo and A.P. Domínguez
Secure Proximity Identification for RFID, G.P. Hancke and S. Drimer
Public Key in RFIDs: Appeal for Asymmetry, E.R. Sanchez, F. Gandino, B. Montrucchio, and M. Rebaudengo
Scalable RFID Privacy Protecting Schemes, S. Fouladgar and H. Afifi
A Secure RFID Access Control Mechanism, D. Huang and Z. Zhou
Threat Modeling in EPC-Based Information Sharing Networks, A. Ilic, T. Burbridge, A. Soppera, F. Michahelles, and E. Fleisch
RFID-Based Secure DVD Content Distribution, S. Lian and Z. Liu
Security in Wireless Sensor Networks
A Survey on Security in Wireless Sensor Networks, Q. Wang and T. Zhang
Intrusion Detection in Wireless Sensor Networks, T. Giannetsos, I. Krontiris, T. Dimitriou, and F.C. Freiling
Key Establishment in Wireless Sensor Networks, I. Chatzigiannakis and E. Konstantinou
Malicious Node Detection in Wireless Sensor Networks, Y. Chen, H. Chen, and W.-S. Ku
Jamming in Wireless Sensor Networks, A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou
Concealed Data Aggregation for Wireless Sensor Networks, A.C.-F. Chan
Message Authentication in Surveillance Networks, R. Sbrusch and T.A. Yang
A Broadcasting Authentication Protocol with DoS and Fault Tolerance For Wireless Ad Hoc Networks, Y. Jiang, M. Shi, X. (S.) Shen, C. Lin, and X. Chu
Security in Integerated RFID and WSN
Threats and Vulnerabilities of RFID and Beyond, J.-H. Hoepman and T. Veugen
Finite Field Arithmetic for RFID and Sensor Networks, J.L. Imaña
Designing SecureWireless Embedded Systems, I. Onat and A. Miri
Index
Multi-Tag RFID Systems, L. Bolotnyy and G. Robins
Attacking RFID Systems, P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda
RFID Relay Attacks: System Analysis,Modeling, and Implementation, A. Lima, A. Miri, and M. Nevins
Physical Privacy and Security in RFID Systems, L. Bolotnyy and G. Robins
Authentication Protocols in RFID Systems, G. Pantelic, S. Bojanic, and V. Tomaševic
Lightweight Cryptography for Low-Cost RFID Tags, P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda
Distance-Bounding Protocols for RFID, J.M. Fajardo and A.P. Domínguez
Secure Proximity Identification for RFID, G.P. Hancke and S. Drimer
Public Key in RFIDs: Appeal for Asymmetry, E.R. Sanchez, F. Gandino, B. Montrucchio, and M. Rebaudengo
Scalable RFID Privacy Protecting Schemes, S. Fouladgar and H. Afifi
A Secure RFID Access Control Mechanism, D. Huang and Z. Zhou
Threat Modeling in EPC-Based Information Sharing Networks, A. Ilic, T. Burbridge, A. Soppera, F. Michahelles, and E. Fleisch
RFID-Based Secure DVD Content Distribution, S. Lian and Z. Liu
Security in Wireless Sensor Networks
A Survey on Security in Wireless Sensor Networks, Q. Wang and T. Zhang
Intrusion Detection in Wireless Sensor Networks, T. Giannetsos, I. Krontiris, T. Dimitriou, and F.C. Freiling
Key Establishment in Wireless Sensor Networks, I. Chatzigiannakis and E. Konstantinou
Malicious Node Detection in Wireless Sensor Networks, Y. Chen, H. Chen, and W.-S. Ku
Jamming in Wireless Sensor Networks, A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou
Concealed Data Aggregation for Wireless Sensor Networks, A.C.-F. Chan
Message Authentication in Surveillance Networks, R. Sbrusch and T.A. Yang
A Broadcasting Authentication Protocol with DoS and Fault Tolerance For Wireless Ad Hoc Networks, Y. Jiang, M. Shi, X. (S.) Shen, C. Lin, and X. Chu
Security in Integerated RFID and WSN
Threats and Vulnerabilities of RFID and Beyond, J.-H. Hoepman and T. Veugen
Finite Field Arithmetic for RFID and Sensor Networks, J.L. Imaña
Designing SecureWireless Embedded Systems, I. Onat and A. Miri
Index
主題書展
更多
主題書展
更多書展購物須知
外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。
無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。
為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。
若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

