pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: PERVASIVE WIRELESS ENVIRONMENTS: DETECTING AND LOCALIZING USER SPOOFING
By: Jie Yang, Yingying Chen, Wade Trappe
Format: Paperback

List price: £44.99


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 3319073559
ISBN 13: 9783319073552
Publisher: SPRINGER INTERNATIONAL PUBLISHING AG
Pub. date: 9 June, 2014
Edition: 2014 ed.
Series: SpringerBriefs in Computer Science
Pages: 72
Synopsis: This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sensor networks. Readers are equipped to understand several system models. One attack detection model exploits the spatial correlation of received signal strength (RSS) inherited from wireless devices as a foundation. Through experiments in practical environments, the authors evaluate the performance of the spoofing attack detection model. The brief also introduces the DEMOTE system, which exploits the correlation within the RSS trace based on each device's identity to detect mobile attackers. A final chapter covers future directions of this field.By presenting complex technical information in a concise format, this brief is a valuable resource for researchers, professionals, and advanced-level students focused on wireless network security.
Illustrations: 4 Tables, black and white; 27 Illustrations, black and white; VIII, 72 p.
Publication: Switzerland
Imprint: Springer International Publishing AG
Returns: Returnable
Some other items by this author:
COMPUTER AND COMPUTING TECHNOLOGIES IN AGRICULTURE IV (HB)
COMPUTER AND COMPUTING TECHNOLOGIES IN AGRICULTURE IV (HB)
COMPUTER AND COMPUTING TECHNOLOGIES IN AGRICULTURE IV (HB)
COMPUTER AND COMPUTING TECHNOLOGIES IN AGRICULTURE IV (HB)
CONTEXT EFFECTS ON EMBODIED REPRESENTATION OF LANGUAGE CONCEPTS (PB)
CONTROL AND COMMUNICATION FOR DEMAND RESPONSE WITH THERMOSTATICALLY CONTROLLED LOADS
CONTROL AND COMMUNICATION FOR DEMAND RESPONSE WITH THERMOSTATICALLY CONTROLLED LOADS (HB)
CURRENT AND FUTURE APPLICATION OF ARTIFI (PB)
DATA MINING AND APPLICATIONS (PB)
EMERGING TRENDS OF BIOMEDICAL CIRCUITS AND SYSTEMS (PB)
FAULT LOCATION AND SERVICE RESTORATION FOR ELECTRICAL DISTRIBUTION SYSTEMS (HB)
INTRODUCTION TO CRYPTOGRAPHY WITH CODING THEORY (HB)
INTRODUCTION TO CRYPTOGRAPHY WITH CODING THEORY (HB)
MENTAL HEALTH IN CHINA
MENTAL HEALTH IN CHINA (HB)
MENTAL HEALTH IN CHINA (PB)
MICRO-MOBILITY MANAGEMENT FOR NEXT-GENERATION WIRELESS NETWORK
MICRO-MOBILITY MANAGEMENT FOR NEXT-GENERATION WIRELESS NETWORK (HB)
MULTIMEDIA FINGERPRINTING FORENSICS FOR TRAITOR TRACING (HB)
NETWORK-AWARE SECURITY FOR GROUP COMMUNICATIONS (HB)
NETWORK-AWARE SECURITY FOR GROUP COMMUNICATIONS (PB)
RANDOM SIGNAL ANALYSIS
SECURING EMERGING WIRELESS SYSTEMS (HB)
SECURING EMERGING WIRELESS SYSTEMS (PB)
SECURING WIRELESS COMMUNICATIONS AT THE PHYSICAL LAYER (HB)
SECURING WIRELESS COMMUNICATIONS AT THE PHYSICAL LAYER (PB)
SENSING VEHICLE CONDITIONS FOR DETECTING DRIVING BEHAVIORS (PB)
SUPPORT VECTOR MACHINE IN CHEMISTRY (HB)
THE POLITICAL ECONOMY OF AFFECT AND EMOTION IN EAST ASIA
THE POLITICAL ECONOMY OF AFFECT AND EMOTION IN EAST ASIA
THE POLITICAL ECONOMY OF AFFECT AND EMOTION IN EAST ASIA
THE POLITICAL ECONOMY OF AFFECT AND EMOTION IN EAST ASIA (HB)
THE POLITICAL ECONOMY OF AFFECT AND EMOTION IN EAST ASIA (PB)
THIS IS NOT AVAILABLE 031434
TINGLI (CD)
UNKNOTTING THE HEART (HB)
UNKNOTTING THE HEART (PB)

TOP SELLERS IN THIS CATEGORY
Data Driven Security (Paperback)
John Wiley & Sons Inc
Our Price : £34.19
more details
The Art of Deception (Paperback)
John Wiley & Sons Inc
Our Price : £7.30
more details
Official (ISC)2 Guide to the CISSP CBK (Hardback)
Apple Academic Press Inc.
Our Price : £62.99
more details
Wireshark 101 (Paperback / softback)
Laura Chappell University
Our Price : £40.95
more details
The Network Security Test Lab (Paperback)
John Wiley & Sons Inc
Our Price : £35.10
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 computer communications & networking
 network security


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 

NEW
World’s Worst Superheroes GET READY FOR SOME SUPERSIZED FUN!
add to basket





New
No Cheese, Please! A fun picture book for children with food allergies - full of friendship and super-cute characters!Little Mo the mouse is having a birthday party.
add to basket

New
My Brother Is a Superhero Luke is massively annoyed about this, but when Zack is kidnapped by his arch-nemesis, Luke and his friends have only five days to find him and save the world...
add to basket


Picture Book
Animal Actions: Snap Like a Crab
By:
The first title in a new preschool series from Guilherme Karsten.
add to basket