Librería:
preigu, Osnabrück, Alemania
Calificación del vendedor: 5 de 5 estrellas
Vendedor de AbeBooks desde 5 de agosto de 2024
Security of Wireless Sensor Networks: Analysis of LEAP | Benjamin Mbuu | Taschenbuch | 56 S. | Englisch | 2019 | LAP LAMBERT Academic Publishing | EAN 9786139444342 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu. N° de ref. del artículo 115846542
It is of paramount importance to have a mechanism of alienating any suspicious node from a network before it leads to any damage. In this form of attack which is popularly referred to as camouflage attack, the attacker first compromises an existing sensor node or inserts a malicious node with an intention of later using it. Once this node joins the network, it will exchange and route messages with the other nodes as a legitimate node, allowing the attacker to gather, modify or inject data.
Reseña del editor: It is of paramount importance to have a mechanism of alienating any suspicious node from a network before it leads to any damage. In this form of attack which is popularly referred to as camouflage attack, the attacker first compromises an existing sensor node or inserts a malicious node with an intention of later using it. Once this node joins the network, it will exchange and route messages with the other nodes as a legitimate node, allowing the attacker to gather, modify or inject data.
Título: Security of Wireless Sensor Networks: ...
Editorial: LAP LAMBERT Academic Publishing
Año de publicación: 2019
Encuadernación: Taschenbuch
Condición: Neu
Librería: moluna, Greven, Alemania
Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Mbuu BenjaminBenjamin holds BSc Computer Technology (1st Class Honors) from Kenya and a Masters degree in Computer Science and Engineering from Osmania University in India. His research interests are Cryptography and Computer Securit. Nº de ref. del artículo: 385858208
Cantidad disponible: Más de 20 disponibles
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -It is of paramount importance to have a mechanism of alienating any suspicious node from a network before it leads to any damage. In this form of attack which is popularly referred to as camouflage attack, the attacker first compromises an existing sensor node or inserts a malicious node with an intention of later using it. Once this node joins the network, it will exchange and route messages with the other nodes as a legitimate node, allowing the attacker to gather, modify or inject data. 56 pp. Englisch. Nº de ref. del artículo: 9786139444342
Cantidad disponible: 2 disponibles
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
Taschenbuch. Condición: Neu. This item is printed on demand - Print on Demand Titel. Neuware -It is of paramount importance to have a mechanism of alienating any suspicious node from a network before it leads to any damage. In this form of attack which is popularly referred to as camouflage attack, the attacker first compromises an existing sensor node or inserts a malicious node with an intention of later using it. Once this node joins the network, it will exchange and route messages with the other nodes as a legitimate node, allowing the attacker to gather, modify or inject data.VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 56 pp. Englisch. Nº de ref. del artículo: 9786139444342
Cantidad disponible: 1 disponibles
Librería: AHA-BUCH GmbH, Einbeck, Alemania
Taschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - It is of paramount importance to have a mechanism of alienating any suspicious node from a network before it leads to any damage. In this form of attack which is popularly referred to as camouflage attack, the attacker first compromises an existing sensor node or inserts a malicious node with an intention of later using it. Once this node joins the network, it will exchange and route messages with the other nodes as a legitimate node, allowing the attacker to gather, modify or inject data. Nº de ref. del artículo: 9786139444342
Cantidad disponible: 1 disponibles
Librería: Revaluation Books, Exeter, Reino Unido
Paperback. Condición: Brand New. 56 pages. 8.66x5.91x0.13 inches. In Stock. Nº de ref. del artículo: zk6139444349
Cantidad disponible: 1 disponibles