0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Pervasive Wireless Environments: Detecting and Localizing User Spoofing (Paperback, 2014 ed.): Jie Yang, Yingying Chen, Wade... Pervasive Wireless Environments: Detecting and Localizing User Spoofing (Paperback, 2014 ed.)
Jie Yang, Yingying Chen, Wade Trappe, Jerry Cheng
R1,749 Discovery Miles 17 490 Ships in 10 - 15 working days

This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sensor networks. Readers are equipped to understand several system models. One attack detection model exploits the spatial correlation of received signal strength (RSS) inherited from wireless devices as a foundation. Through experiments in practical environments, the authors evaluate the performance of the spoofing attack detection model. The brief also introduces the DEMOTE system, which exploits the correlation within the RSS trace based on each device s identity to detect mobile attackers. A final chapter covers future directions of this field. By presenting complex technical information in a concise format, this brief is a valuable resource for researchers, professionals, and advanced-level students focused on wireless network security."

Securing Emerging Wireless Systems - Lower-layer Approaches (Paperback, Softcover reprint of hardcover 1st ed. 2009): Yingying... Securing Emerging Wireless Systems - Lower-layer Approaches (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Yingying Chen, Wenyuan Xu, Wade Trappe, YanYong Zhang
R2,983 Discovery Miles 29 830 Ships in 10 - 15 working days

Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a collection of defense mechanisms that operate at the lower-layers of the protocol stack and can defend wireless systems before the effects of attacks propagate up to higher-level applications and services.

The book will focus on fundamental security problems that involve properties unique to wireless systems, such as the characteristics of radio propagation, or the location of communicating entities, or the properties of the medium access control layer. Specifically, the book provides detection mechanisms and highlights defense strategies that cope with threats to wireless localization infrastructure, attacks on wireless networks that exploit entity identity (i.e. spoofing attacks), jamming and radio interference that can undermine the availability of wireless communications, and privacy threats where an adversary seeks to infer spatial and temporal contextual information surrounding wireless communications. Additionally, the authors explore new paradigms of physical layer security for wireless systems, which can support authentication and confidentiality services by exploiting fading properties unique to wireless communications.

Securing Emerging Wireless Systems - Lower-layer Approaches (Hardcover, 1st Edition.
2nd Printing. 2008): Yingying Chen,... Securing Emerging Wireless Systems - Lower-layer Approaches (Hardcover, 1st Edition. 2nd Printing. 2008)
Yingying Chen, Wenyuan Xu, Wade Trappe, YanYong Zhang
R3,017 Discovery Miles 30 170 Ships in 10 - 15 working days

Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a collection of defense mechanisms that operate at the lower-layers of the protocol stack and can defend wireless systems before the effects of attacks propagate up to higher-level applications and services.

The book will focus on fundamental security problems that involve properties unique to wireless systems, such as the characteristics of radio propagation, or the location of communicating entities, or the properties of the medium access control layer. Specifically, the book provides detection mechanisms and highlights defense strategies that cope with threats to wireless localization infrastructure, attacks on wireless networks that exploit entity identity (i.e. spoofing attacks), jamming and radio interference that can undermine the availability of wireless communications, and privacy threats where an adversary seeks to infer spatial and temporal contextual information surrounding wireless communications. Additionally, the authors explore new paradigms of physical layer security for wireless systems, which can support authentication and confidentiality services by exploiting fading properties unique to wireless communications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Double Sided Wallet
R91 Discovery Miles 910
Strontium Technology AMMO USB 3.1 flash…
R70 Discovery Miles 700
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Aerolatte Cappuccino Art Stencils (Set…
R110 R95 Discovery Miles 950
JBL T110 In-Ear Headphones (Black)
 (13)
R229 R201 Discovery Miles 2 010
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Imploding The Mirage
The Killers CD R71 Discovery Miles 710
Stealth SX-C10-X Twin Rechargeable…
R499 R269 Discovery Miles 2 690
Barbie
Margot Robbie, Ryan Gosling Blu-ray disc R266 Discovery Miles 2 660
Croxley Desk Cube Holder (Black) - Paper…
 (1)
R37 Discovery Miles 370

 

Partners