Security in resource constrained devices (Paperback)


The perspective of a society with pervasive computing features is becoming a reality and is made possible by intelligent devices of the size of a grain of sand: tiny devices, with many different degree of miniaturization, power autonomy, communication capabilities, applications and last but not least costs. Such devices are resource constrained in memory storage, in computation power and in energy. Despite the appealing feature and the myriad of possible applications, the resource constrained nature of such devices, the wireless environment in which they operate, the broadcast way to communicate and their unattended use, expose them to many known threats, while traditional countermeasures cannot be adopted in the above mentioned technologies: RFID tags and sensor nodes cannot use asymmetric cryptography, tamper-proof solutions would increase the costs of such technologies, and so on. This book describes several protocols specifically designed to be employed in resource constrained devices, that try to hit the right balance between security objectives and security overheads.

R1,571

Or split into 4x interest-free payments of 25% on orders over R50
Learn more

Discovery Miles15710
Mobicred@R147pm x 12* Mobicred Info
Free Delivery
Delivery AdviceShips in 10 - 15 working days


Toggle WishListAdd to wish list
Review this Item

Product Description

The perspective of a society with pervasive computing features is becoming a reality and is made possible by intelligent devices of the size of a grain of sand: tiny devices, with many different degree of miniaturization, power autonomy, communication capabilities, applications and last but not least costs. Such devices are resource constrained in memory storage, in computation power and in energy. Despite the appealing feature and the myriad of possible applications, the resource constrained nature of such devices, the wireless environment in which they operate, the broadcast way to communicate and their unattended use, expose them to many known threats, while traditional countermeasures cannot be adopted in the above mentioned technologies: RFID tags and sensor nodes cannot use asymmetric cryptography, tamper-proof solutions would increase the costs of such technologies, and so on. This book describes several protocols specifically designed to be employed in resource constrained devices, that try to hit the right balance between security objectives and security overheads.

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

VDM Verlag

Country of origin

Germany

Release date

March 2010

Availability

Expected to ship within 10 - 15 working days

First published

March 2010

Authors

Dimensions

229 x 152 x 8mm (L x W x T)

Format

Paperback - Trade

Pages

136

ISBN-13

978-3-8364-8097-0

Barcode

9783836480970

Categories

LSN

3-8364-8097-2



Trending On Loot