home libri books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

yang jie; chen yingying; trappe wade; cheng jerry - pervasive wireless environments: detecting and localizing user spoofing

Pervasive Wireless Environments: Detecting and Localizing User Spoofing

; ; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
54,98 €
NICEPRICE
52,23 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 07/2014
Edizione: 2014





Trama

This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sensor networks. Readers are equipped to understand several system models. One attack detection model exploits the spatial correlation of received signal strength (RSS) inherited from wireless devices as a foundation. Through experiments in practical environments, the authors evaluate the performance of the spoofing attack detection model. The brief also introduces the DEMOTE system, which exploits the correlation within the RSS trace based on each device’s identity to detect mobile attackers. A final chapter covers future directions of this field. By presenting complex technical information in a concise format, this brief is a valuable resource for researchers, professionals, and advanced-level students focused on wireless network security.




Sommario

Introduction.- Feasibility of Launching User Spoofing.- Attack Detection Model.- Detection and Localizing Multiple Spoofing Attackers.-Detecting Mobile Agents Using Identity Fraud.- Related Work.- Conclusions and Future Work.










Altre Informazioni

ISBN:

9783319073552

Condizione: Nuovo
Collana: SpringerBriefs in Computer Science
Dimensioni: 235 x 155 mm Ø 1358 gr
Formato: Brossura
Illustration Notes:VIII, 72 p. 27 illus.
Pagine Arabe: 72
Pagine Romane: viii


Dicono di noi