![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
The widespread availability of mobile devices along with recent
advancements in networking capabilities make opportunistic mobile
social networks (MSNs) one of the most promising technologies for
next-generation mobile applications. Opportunistic Mobile Social
Networks supplies a new perspective of these networks that can help
you enhance spontaneous interaction and communication among users
that opportunistically encounter each other, without additional
infrastructure support.
Taking an in-depth look at multicast protocols, the book
explains how to provide pervasive data access to mobile users
without the support of cellular or Internet infrastructures.
Considering privacy and security issues, it surveys a collection of
cutting-edge approaches for minimizing privacy leakage during
opportunistic user profile exchange.
MIMO Processing for 4G and Beyond: Fundamentals and Evolution offers a cutting-edge look at multiple-input multiple-output (MIMO) signal processing, namely its detection (in both time and frequency domains) and precoding. It examines its integration with OFDM, UWB, and CDMA, along with the impact of these combinations at the system level. Massive MIMO and network coding at the physical layer are very recent topics which are also addressed, and which are expected to play an important role in 5G systems. The book brings together contributing authors from first-class institutions who have been working in international research and development (R&D) projects and are highly cited in the MIMO field. These experts examine ongoing R&D activities in the field of MIMO systems and its associated signal processing that is expected to be employed in 4G and 5G systems. Covers the various wireless communication standards that make use of MIMO systems Explains the receiver processing associated with MIMO signal detection (including the case of massive MIMO systems) and presents the optimal precoding techniques Considers optimized MIMO schemes and processing for block transmission techniques, for orthogonal frequency division multiplexing (OFDM) transmission techniques, and for single carrier-frequency domain equalization Examines MIMO processing and optimization for wideband code division multiple access (WCDMA) Describes the ultra-wideband (UWB) transmission technique and the corresponding MIMO processing and optimizations Explains physical layer network coding techniques From basic receiver design to more advanced processing, the book covers the spectrum of topics associated with MIMO systems and MIMO processing. It provides a comprehensive description of MIMO fundamentals and theory that is ideal for anyone looking to sharpen their skills on the subject, such as corporate/industrial employees or graduate students. The book summarizes the most important enhancements related to the processing of MIMO systems for 4G systems, including its evolution and future trends. It also supplies a performance analysis of the various combinations of MIMO schemes for 4G systems to help you select the combination best suited for your particular needs.
For courses in wireless networking, wireless communications, wireless data communications or wireless technology in departments of Computer Science, Engineering, IT, and Continuing Education. The rapid growth of mobile telephone use, satellite services, and the wireless Internet are generating tremendous changes in telecommunications and networking. Combining very current technical depth with a strong pedagogy and advanced Web support, this new edition provides a comprehensive guide to wireless technology-exploring key topics such as technology and architecture, network types, design approaches, and the latest applications. Visit Stallings Companion Website at http: //williamstallings.com/CompSec/CompSec1e.html for student and instructor resources and his Computer Science Student Resource site http: //williamstallings.com/StudentSupport.html Password protected instructor resources can be accessed here by clicking on the Resources Tab to view downloadable files. (Registration required) They include Power Point Slides, Solutions, tables and figure
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer. The text explains how to deal with black hole attacks in mobile ad hoc networks and describes how to detect misbehaving nodes in vehicular ad hoc networks. It identifies a pragmatic and energy efficient security layer for wireless sensor networks and covers the taxonomy of security protocols for wireless sensor communications. Exploring recent trends in the research and development of multihop network security, the book outlines possible defenses against packet-dropping attacks in wireless multihop ad hoc networks.Complete with expectations for the future in related areas, this is an ideal reference for researchers, industry professionals, and academics. Its comprehensive coverage also makes it suitable for use as a textbook in graduate-level electrical engineering programs.
One of the first publications of its kind in the exciting field of multiple input multiple output (MIMO) power line communications (PLC), MIMO Power Line Communications: Narrow and Broadband Standards, EMC, and Advanced Processing contains contributions from experts in industry and academia, making it practical enough to provide a solid understanding of how PLC technologies work, yet scientific enough to form a base for ongoing R&D activities. This book is subdivided into five thematic parts. Part I looks at narrow- and broadband channel characterization based on measurements from around the globe. Taking into account current regulations and electromagnetic compatibility (EMC), part II describes MIMO signal processing strategies and related capacity and throughput estimates. Current narrow- and broadband PLC standards and specifications are described in the various chapters of part III. Advanced PLC processing options are treated in part IV, drawing from a wide variety of research areas such as beamforming/precoding, time reversal, multi-user processing, and relaying. Lastly, part V contains case studies and field trials, where the advanced technologies of tomorrow are put into practice today. Suitable as a reference or a handbook, MIMO Power Line Communications: Narrow and Broadband Standards, EMC, and Advanced Processing features self-contained chapters with extensive cross-referencing to allow for a flexible reading path.
The rapid advancement of various wireless communication system services has created the need to analyze the possibility of their performance improvement. Introducing the basic principles of digital communications performance analysis and its mathematical formalization, Fading and Interference Mitigation in Wireless Communications will help you stay up to date with recent developments in the performance analysis of space diversity reception over fading channels in the presence of cochannel interference. The book presents a unified method for computing the performance of digital communication systems characterized by a variety of modulation and detection types and channel models. Explaining the necessary concepts of digital communication system design, the book guides you step by step through the basics of performance analysis of digital communication receivers. Supplying you with the tools to perform an accurate performance evaluation of the proposed communication scenarios, the book includes coverage of multichannel reception in various fading environments, influence of cochannel interference, and macrodiversity reception when channels are simultaneously affected by various types of fading and shadowing. It also includes many numerical illustrations of applications that correspond to practical systems. The book presents a large collection of system performance curves to help researchers and system designers perform their own tradeoff studies. The presented collection of system performances will help you perform trade-off studies among the various communication type/drawback combinations in order to determine the optimal choice considering the available constraints. The concepts covered in this book can be useful across a range of applications, including wireless, satellite, terrestrial, and maritime communications.
Do you believe in open-source development? Would you like to see your security system grow and learn by itself? Are you sick of paying for software license fees every year that produce little return on investment? And, would you prefer to invest in something you could sell later on to other IT security departments? If you answered yes to these questions, then this is the book for you. Addressing the issues of fault identification and classification, Self-Healing Systems and Wireless Networks Management presents a method for identifying and classifying faults using causal reasoning-a powerful bottom up technique for deep surface and cross context correlation establishment. It explains how to employ a similarity matrix to match the user activity log and its pattern in a transformed space and discusses the development and deployment of a policy engine. The book describes how to use this self-growing policy engine in collaboration with a scheduler and plug-in bank to generate a healing policy. This healing policy presents the solution of the direct and causal fault. The author describes how to embed the solutions of the related faults in the healing policy so that if a client faces more faults related to the previous one, they can be addressed at the client side. Exploring prototype systems, the text defines supporting systems architectures and includes a case study of an autonomic healing-based self-management engine. It also explains how to fulfill the tasks in linear time, so that the increase in the source file size does not affect the performance of your system-making the system highly scalable for distributed self-healing systems. This book provides valuable guidance to help you build a self-growing, self -earning, self-healing system that, after development, learns for itself about the IT security vulnerabilities of your organization and fills the holes for future breach prevention.
Chaotic Signals in Digital Communications combines fundamental background knowledge with state-of-the-art methods for using chaotic signals and systems in digital communications. The book builds a bridge between theoretical works and practical implementation to help researchers attain consistent performance in realistic environments. It shows the possible shortcomings of the chaos-based communication systems proposed in the literature, particularly when they are subjected to non-ideal conditions. It also presents a toolbox of techniques for researchers working to actually implement such systems. A Combination of Tutorials and In-Depth, Cutting-Edge Research Featuring contributions by active leading researchers, the book begins with an introduction to communication theory, dynamical systems, and chaotic communications suitable for those new to the field. This lays a solid foundation for the more applied chapters that follow. A Toolbox of Techniques-Including New Ways to Tackle Channel Imperfections The book covers typical chaos communication methods, namely chaotic masking, chaotic modulation, chaotic shift key, and symbolic message bearing, as well as bidirectional communication and secure communication. It also presents novel methodologies to deal with communication channel imperfections. These tackle band-limited channel chaos communication, radio channels with fading, and the resistance of a special chaotic signal to multipath propagations. In addition, the book addresses topics related to engineering applications, such as optical communications, chaotic matched filters and circuit implementations, and microwave frequency-modulated differential chaos shift keying (FM-DCSK) systems. Insights for Both Theoretical and Experimental Researchers Combining theory and practice, this book offers a unique perspective on chaotic communication in the context of non-ideal conditions. Written for theoretical and experimental researchers, it tackles the practical issues faced in implementing chaos-based signals and systems in digital communications applications.
This book focuses on mobile data and its applications in the wireless networks of the future. Several topics form the basis of discussion, from a mobile data mining platform for collecting mobile data, to mobile data processing, and mobile feature discovery. Usage of mobile data mining is addressed in the context of three applications: wireless communication optimization, applications of mobile data mining on the cellular networks of the future, and how mobile data shapes future cities. In the discussion of wireless communication optimization, both licensed and unlicensed spectra are exploited. Advanced topics include mobile offloading, resource sharing, user association, network selection and network coexistence. Mathematical tools, such as traditional convexappl/non-convex, stochastic processing and game theory are used to find objective solutions. Discussion of the applications of mobile data mining to cellular networks of the future includes topics such as green communication networks, 5G networks, and studies of the problems of cell zooming, power control, sleep/wake, and energy saving. The discussion of mobile data mining in the context of smart cities of the future covers applications in urban planning and environmental monitoring: the technologies of deep learning, neural networks, complex networks, and network embedded data mining. Mobile Data Mining and Applications will be of interest to wireless operators, companies, governments as well as interested end users.
Equalizers are present in all forms of communication systems. Neuro-Fuzzy Equalizers for Mobile Cellular Channels details the modeling of a mobile broadband communication channel and designing of a neuro-fuzzy adaptive equalizer for it. This book focuses on the concept of the simulation of wireless channel equalizers using the adaptive-network-based fuzzy inference system (ANFIS). The book highlights a study of currently existing equalizers for wireless channels. It discusses several techniques for channel equalization, including the type-2 fuzzy adaptive filter (type-2 FAF), compensatory neuro-fuzzy filter (CNFF), and radial basis function (RBF) neural network. Neuro-Fuzzy Equalizers for Mobile Cellular Channels starts with a brief introduction to channel equalizers, and the nature of mobile cellular channels with regard to the frequency reuse and the resulting CCI. It considers the many channel models available for mobile cellular channels, establishes the mobile indoor channel as a Rayleigh fading channel, presents the channel equalization problem, and focuses on various equalizers for mobile cellular channels. The book discusses conventional equalizers like LE and DFE using a simple LMS algorithm and transversal equalizers. It also covers channel equalization with neural networks and fuzzy logic, and classifies various equalizers.This being a fairly new branch of study, the book considers in detail the concept of fuzzy logic controllers in noise cancellation problems and provides the fundamental concepts of neuro-fuzzy. The final chapter offers a recap and explores venues for further research. This book also establishes a common mathematical framework of the equalizers using the RBF model and develops a mathematical model for ultra-wide band (UWB) channels using the channel co-variance matrix (CCM). Introduces the novel concept of the application of adaptive-network-based fuzzy inference system (ANFIS) in the design of wireless channel equalizers Provides model ultra-wide band (UWB) channels using channel co-variance matrix Offers a formulation of a unified radial basis function (RBF) framework for ANFIS-based and fuzzy adaptive filter (FAF) Type II, as well as compensatory neuro-fuzzy equalizers Includes extensive use of MATLAB (R) as the simulation tool in all the above cases
For all the interest that wireless sensor networks have created over the past decade, there are few examples to show that they are truly delivering on this promise and anticipation. What is missing? Deviating from the usual focus on routing and energy efficiency, Building Sensor Networks: From Design to Applications attempts to stitch together the path from conceptual development of applications, on one end, to actual complete applications at the other. With this change in perspective, the book examines important facets of wireless sensor networks (WSNs) that are not often discussed in the literature. From Design Practices to the Networking Protocols that Glue Applications Together Organized into three sections, the book presents insights from international experts representing both industry and academia. The first section, on design practices, explores alternative ways to approach the tasks of developing a suitable WSN solution to an application and assisting that development in a manner that is not necessarily tied to a particular application. The second section, on networking protocols, illustrates the impact of the intermediaries-the "glue" of putting applications together. Chapters look at ways to address traffic, delays in network clustering, and the coexistence of a WSN with other systems on a frequency band. The final section of the book delves into experiences with applications in chemical sensing, defense, global trade and security, and ecosystem monitoring. Although these applications may fail the purist definition of an ideal WSN, they offer valuable lessons for the future development and deployment of WSNs. Challenge Your Thinking about Designing WSN Applications Emphasizing the need to build applications, the contributors present examples of what applications of WSNs could look like and identify the constraints. Throughout, the book challenges and illuminates your thinking about how to tame the complexity of designing a WSN application. It is essential reading for anyone interested in future wireless technologies.
This book introduces in detail the theory of adaptive optics and its correction technology for light wave distortion in wireless optical communication. It discusses the adaptive control algorithm of wavefront distortion, proportional+integral control algorithm and iterative control algorithm, and double fuzzy adaptive PID control algorithm. It also covers the SPGD algorithm of adaptive optics correction, deformable mirrors eigenmode method of wavefront aberration correction, vortex beam wavefront detecting wavefront aberration correction, liquid crystal spatial light modulator wavefront correction, different wavelengths of Gaussian beam transmission wavefront differences in the atmospheric turbulence and correction and with wavefront tilt correction adaptive optics wavefront aberration correction. Various distortion correction methods are verified by experiments and the experimental results are analyzed. This book is suitable for engineering and technical personnel engaged in wireless optical communication, college teachers, graduate students and senior undergraduate students.
Although several books and academic courses discuss data
management and networking, few of them focus on the convergence of
networking and software technologies for identifying, addressing,
and managing distributed data. Focusing on this convergence,
Identification and Management of Distributed Data: NGN,
Content-Centric Networks and the Web collates and describes the
various distributed data management technologies to help readers
from various backgrounds understand the common aspects that govern
distributed data management.
The first book to focus on the communications and networking aspects of UAVs, this unique resource provides the fundamental knowledge needed to pursue research in the field. The team of authors covers the foundational concepts of the topic, as well as offering a detailed insight into the state of the art in UAVs and UAV networks, discussing the regulations, policies, and procedures for deployment (including analysis of risks and rewards), along with demonstrations, test-beds, and practical real-world applications in areas such as wildlife detection and emergency communications. This is essential reading for graduate students, researchers, and professionals in communications and networking.
Machine learning explores the study and development of algorithms that can learn from and make predictions and decisions based on data. Applications of machine learning in wireless communications have been receiving a lot of attention, especially in the era of big data and IoT, where data mining and data analysis technologies are effective approaches to solving wireless system evaluation and design issues. This edited book presents current and future developments and trends in wireless communication technologies based on contributions from machine learning and other fields of artificial intelligence, including channel modelling, signal estimation and detection, energy efficiency, cognitive radios, wireless sensor networks, vehicular communications, and wireless multimedia communications. The book is aimed at a readership of researchers, engineers and students working on wireless communications and machine learning, especially those working with big data and artificial intelligence multi-disciplinary fields related to wireless communication technologies.
Although valued for its ability to allow teams to collaborate and foster coalitional behaviors among the participants, game theory s application to networking systems is not without challenges. Distributed Strategic Learning for Wireless Engineers illuminates the promise of learning in dynamic games as a tool for analyzing network evolution and underlines the potential pitfalls and difficulties likely to be encountered. Establishing the link between several theories, this book demonstrates what is needed to learn strategic interaction in wireless networks under uncertainty, randomness, and time delays. It addresses questions such as:
The book provides an explicit description of how players attempt to learn over time about the game and about the behavior of others. It focuses on finite and infinite systems, where the interplay among the individual adjustments undertaken by the different players generates different learning dynamics, heterogeneous learning, risk-sensitive learning, and hybrid dynamics.
Providing a practical review of the latest technology in the field, " "Ultrawideband Radar Applications and Design presents cutting-edge advances in theory, design, and practical applications of ultrawideband (UWB) radar. This book features contributions from an international team of experts to help readers learn about a wide range of UWB topics, including:
This book s contributors use practical information to illustrate the latest theoretical developments and demonstrate UWB radar principles through case studies. Radar system engineers will find ideas for precision electronic sensing systems for use in medical, security, industrial, construction, and geophysical applications, as well as those used in archeological, forensic and transportation operations.
This book presents an in-depth study on the recent advances in Wireless Sensor Networks (WSNs). The authors describe the existing WSN applications and discuss the research efforts being undertaken in this field. Theoretical analysis and factors influencing protocol design are also highlighted. The authors explore state-of-the-art protocols for WSN protocol stack in transport, routing, data link, and physical layers. Moreover, the synchronization and localization problems in WSNs are investigated along with existing solutions. Furthermore, cross-layer solutions are described. Finally, developing areas of WSNs including sensor-actor networks, multimedia sensor networks, and WSN applications in underwater and underground environments are explored. The book is written in an accessible, textbook style, and includes problems and solutions to assist learning. Key Features: The ultimate guide to recent advances and research into WSNs Discusses the most important problems and issues that arise when programming and designing WSN systems Shows why the unique features of WSNs - self-organization, cooperation, correlation -- will enable new applications that will provide the end user with intelligence and a better understanding of the environment Provides an overview of the existing evaluation approaches for WSNs including physical testbeds and software simulation environments Includes examples and learning exercises with a solutions manual; supplemented by an accompanying website containing PPT-slides. "Wireless Sensor Networks" is an essential textbook for advanced students on courses in wireless communications, networking and computer science. It will also be of interest to researchers, system and chip designers, network planners, technical mangers and other professionals in these fields.
This book focuses on broadband power amplifier design for wireless communication. Nonlinear model embedding is described as a powerful tool for designing broadband continuous Class-J and continuous class F power amplifiers. The authors also discuss various techniques for extending bandwidth of load modulation based power amplifiers, such as Doherty power amplifier and Chireix outphasing amplifiers. The book also covers recent trends on digital as well as analog techniques to enhance bandwidth and linearity in wireless transmitters. Presents latest trends in designing broadband power amplifiers; Covers latest techniques for using nonlinear model embedding in designing power amplifiers based on waveform engineering; Describes the latest techniques for extending bandwidth of load modulation based power amplifiers such as Doherty power amplifier and Chireix outphasing amplifiers; Includes coverage of hybrid analog/digital predistortion as wideband solution for wireless transmitters; Discusses recent trends on on-chip power amplifier design with GaN /GaAs MMICs for high frequency applications.
Since publication of the first edition of Sensor Array Signal Processing in 2000, the field it heralded has come of age. Sensor arrays helped usher in the age of wireless communication by meeting the increasing capacity requirements of ever growing wireless networks, but that is only one example of the number of uses served by this valuable technology across any number of fields. Extensively updated and expanded, Sensor Array Signal Processing, Second Edition covers a wide range of interrelated topics in array processing to provide an introduction to the field that one will not find in the literature. The book introduces new developments in the use of sensors in wireless networks and the use of distributed sensors for localization. It unravels layers of complexity to explore underlying basic principles of array signal processing, focusing on the common threads that exist in wavefield analysis, rather than on particular applications. Following an introduction to the basic equations governing different wavefields, the text provides updated coverage on current topics of interest. It analyzes various types of sensor configurations; focusing on those most useful for understanding array systems in practice - uniform linear and circular arrays. Fully updated with over 150 new pages, this new edition: Includes new chapters - emphasizing the use of sensor arrays in wireless communication and localization Adds new exercises and examples to the end of each chapter Provides information on emerging topics covering, distributed sensor array, multi-component sensors, space-time processing, azimuth/elevation estimation, wideband adaptive beamformation, and frequency invariant beamformation An invaluable tool for self-study, this book provides those working in or interested in medical imaging, astronomy, radar, communications, sonar, seismology or any field that studies propagating wavefields, with a highly accessible guide. It describes each concept in precise mathematical language complete with numerical examples, detailed illustrations, and practice exercises at the end of each chapter to reinforce concepts. As with the first edition, this volume also meets the needs of professors wishing to adopt the book for graduate-level courses in telecommunications and electrical engineering.
In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing. As always, adequate security remains one of the open areas of concern before wide deployment of RFID and WSNs can be achieved. Security in RFID and Sensor Networks is the first book to offer a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and integrated RFID and WSNs, providing an essential reference for those who regularly interface with these versatile technologies. Exposes Security Risks The book begins with a discussion of current security issues that threaten the effective use of RFID technology. The contributors examine multi-tag systems, relay attacks, authentication protocols, lightweight cryptography, and host of other topics related to RFID safety. The book then shifts the focus to WSNs, beginning with a background in sensor network security before moving on to survey intrusion detection, malicious node detection, jamming, and other issues of concern to WSNs and their myriad of applications. Offers Viable Solutions In each chapter, the contributors propose effective solutions to the plethora of security challenges that confront users, offering practical examples to aid in intuitive understanding. The last part of the book reviews the security problems inherent in integrated RFID & WSNs. The book ends with a glimpse of the future possibilities in these burgeoning technologies and provides recommendations for the proactive design of secure wireless embedded systems.
"A Smart Network Solution to Crowded Bandwidth" Fueled by ongoing and increasing consumer demand, the explosive growth in spectrum-based communications continues to tax the finite resources of the available spectrum. One possible solution, Cognitive Radio Network (CRN), allows unlicensed users opportunistic access to licensed bands without interfering with existing users. Although some initial study has been conducted in this field, researchers need a systematic reference book that presents clear definitions, functions, and current challenges of the CRNs. Cognitive Radio Networks presents state-of-the-art approaches and novel technologies for cognitive wireless radio networks and sheds light on future developments in these areas. Comprising the contributions of many prominent world-wide cognitive radio researchers, this book covers all CRN essentials including spectrum sensing, spectrum handoff, spectrum sharing, and CRN routing schemes. Divided into five parts, the book addresses the physical layer, medium access control, the routing layer, cross-layer considerations and advanced topics in cognitive radio networks. The chapters also review research, management, support, and cognitive techniques such as position and network awareness, infrastructure and physical and link layer concerns. The editors of this volume are noted experts in the field of wireless networks and security. Dr. Yang Xiao's research has been supported by the U.S. National Science Foundation (NSF), U.S. Army Research, Fleet & Industrial Supply Center San Diego (FISCSD), and the University of Alabama's Research Grants Committee. Dr. Fei Hu has worked with NSF, Cisco, Lockheed Martin, Sprint, and otherorganizations. By bringing together the combined input of international experts, these editors have advanced the field of this nascent technology and helped to forge new paths of discovery for progressive communications possibilities.
Recent advances in Wireless Power Transmission (WPT) technologies have enabled various engineering applications with potential product implementation. WPT can be utilized to charge batteries in various pieces of equipment without the need for a wired connection. Energy can be harvested from ambient RF and microwave radiation and 1 million kW microwaves can be transmitted from space to the ground. This book covers all the theory and technologies of WPT, such as microwave generators with semi-conductors and microwave tubes, antennas, phased arrays, beam efficiency, and rectifiers (rectenna). The authors also discuss coupling WPT. Applications, such as energy harvesting, sensor networks, point-to-point WPT, WPT to moving targets (airplane, vehicle, etc.) and Solar Power Satellite are also presented.
Wireless Sensor Networks presents the latest practical solutions to the design issues presented in wireless-sensor-network-based systems. Novel features of the text, distributed throughout, include workable solutions, demonstration systems and case studies of the design and application of wireless sensor networks (WSNs) based on the first-hand research and development experience of the author, and the chapters on real applications: building fire safety protection; smart home automation; and logistics resource management. Case studies and applications illustrate the practical perspectives of: * sensor node design; * embedded software design; * routing algorithms; * sink node positioning; * co-existence with other wireless systems; * data fusion; * security; * indoor location tracking; * integrating with radio-frequency identification; and * Internet of things Wireless Sensor Networks brings together multiple strands of research in the design of WSNs, mainly from software engineering, electronic engineering, and wireless communication perspectives, into an over-arching examination of the subject, benefiting students, field engineers, system developers and IT professionals. The contents have been well used as the teaching material of a course taught at postgraduate level in several universities making it suitable as an advanced text book and a reference book for final-year undergraduate and postgraduate students.
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities. Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practitioners in the field. Containing thirteen invited chapters from internationally recognized security experts, this volume details attacks, encryption, authentication, watermarking, key management, secure routing, and secure aggregation, location, and cross-layer. It offers insight into attacking and defending routing mechanisms in ad hoc and sensor networks, and analyzes MAC layer attacks in 802.15.4 sensor networks. About the Author Before joining the Department of Computer Science at the University of Alabama in 2006, and his prior position at the University of Memphis in 2002, Dr. Yang Xiao was an accomplished Medium Access Control (MAC) architect deeply involved in IEEE 802.11 standard enhancement. A former voting member of IEEE 802.11 Working Group, he serves as editor or on the editorial boards of numerous prestigious journals that cover emerging topics within mobile and wireless computing. A co-editor of seven books, he also serves as a referee/reviewer for many funding agencies, as well as a panelist for the National Science Foundation. |
You may like...
Solutions for High-Touch Communications…
Michael A. Brown Sr.
Hardcover
R4,624
Discovery Miles 46 240
MIMO Wireless Networks - Channels…
Bruno Clerckx, Claude Oestges
Hardcover
R2,237
Discovery Miles 22 370
The COVID-19 Pandemic and the…
Floribert Patrick Calvain Endong
Hardcover
R5,848
Discovery Miles 58 480
RF / Microwave Circuit Design for…
Ulrich L. Rohde, Matthias Rudolph
Hardcover
R4,952
Discovery Miles 49 520
Cellular Internet of Things - From…
Olof Liberg, Marten Sundberg, …
Paperback
R2,403
Discovery Miles 24 030
Wireless Sensor and Actuator Networks…
Roberto Verdone, Davide Dardari, …
Hardcover
R2,237
Discovery Miles 22 370
Cross-Layer Resource Allocation in…
Ana I. Perez-Neira, Marc Realp Campalans
Hardcover
R1,930
Discovery Miles 19 300
|