0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Securing Emerging Wireless Systems - Lower-layer Approaches (Hardcover, 1st Edition.
2nd Printing. 2008): Yingying Chen,... Securing Emerging Wireless Systems - Lower-layer Approaches (Hardcover, 1st Edition. 2nd Printing. 2008)
Yingying Chen, Wenyuan Xu, Wade Trappe, YanYong Zhang
R2,844 Discovery Miles 28 440 Ships in 10 - 15 working days

Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a collection of defense mechanisms that operate at the lower-layers of the protocol stack and can defend wireless systems before the effects of attacks propagate up to higher-level applications and services.

The book will focus on fundamental security problems that involve properties unique to wireless systems, such as the characteristics of radio propagation, or the location of communicating entities, or the properties of the medium access control layer. Specifically, the book provides detection mechanisms and highlights defense strategies that cope with threats to wireless localization infrastructure, attacks on wireless networks that exploit entity identity (i.e. spoofing attacks), jamming and radio interference that can undermine the availability of wireless communications, and privacy threats where an adversary seeks to infer spatial and temporal contextual information surrounding wireless communications. Additionally, the authors explore new paradigms of physical layer security for wireless systems, which can support authentication and confidentiality services by exploiting fading properties unique to wireless communications.

Securing Emerging Wireless Systems - Lower-layer Approaches (Paperback, Softcover reprint of hardcover 1st ed. 2009): Yingying... Securing Emerging Wireless Systems - Lower-layer Approaches (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Yingying Chen, Wenyuan Xu, Wade Trappe, YanYong Zhang
R2,812 Discovery Miles 28 120 Ships in 10 - 15 working days

Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a collection of defense mechanisms that operate at the lower-layers of the protocol stack and can defend wireless systems before the effects of attacks propagate up to higher-level applications and services.

The book will focus on fundamental security problems that involve properties unique to wireless systems, such as the characteristics of radio propagation, or the location of communicating entities, or the properties of the medium access control layer. Specifically, the book provides detection mechanisms and highlights defense strategies that cope with threats to wireless localization infrastructure, attacks on wireless networks that exploit entity identity (i.e. spoofing attacks), jamming and radio interference that can undermine the availability of wireless communications, and privacy threats where an adversary seeks to infer spatial and temporal contextual information surrounding wireless communications. Additionally, the authors explore new paradigms of physical layer security for wireless systems, which can support authentication and confidentiality services by exploiting fading properties unique to wireless communications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Kiddylicious Cheese Straws (12g)
 (2)
R28 R25 Discovery Miles 250
Sylvanian Families - Walnut Squirrel…
R749 R579 Discovery Miles 5 790
Homequip USB Rechargeable Clip on Fan (3…
R450 R380 Discovery Miles 3 800
Ultra Link UL-HPBT01 Gravity Bluetooth…
 (4)
R499 R419 Discovery Miles 4 190
The South African Law Of Persons
Jacqueline Heaton Paperback  (7)
R958 R799 Discovery Miles 7 990
Bantex B9875 A5 Record Card File Box…
 (1)
R125 R112 Discovery Miles 1 120
Marvel Spiderman Fibre-Tip Markers (Pack…
R57 Discovery Miles 570
ZA Key Ring Pendant with Sound and Light
R199 Discovery Miles 1 990
Winged Messenger - Running Your First…
Bruce Fordyce Paperback  (1)
R220 R172 Discovery Miles 1 720
Zap! Air Dry Pottery Kit
Kit R250 R195 Discovery Miles 1 950

 

Partners