Developing Security Tools of WSN and WBAN Networks Applications

Author:   Mohsen A. M. El-Bendary
Publisher:   Springer Verlag, Japan
Edition:   Softcover reprint of the original 1st ed. 2015
Volume:   316
ISBN:  

9784431563570


Pages:   212
Publication Date:   10 September 2016
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $290.37 Quantity:  
Add to Cart

Share |

Developing Security Tools of WSN and WBAN Networks Applications


Add your own review!

Overview

Full Product Details

Author:   Mohsen A. M. El-Bendary
Publisher:   Springer Verlag, Japan
Imprint:   Springer Verlag, Japan
Edition:   Softcover reprint of the original 1st ed. 2015
Volume:   316
Weight:   3.999kg
ISBN:  

9784431563570


ISBN 10:   4431563571
Pages:   212
Publication Date:   10 September 2016
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Introduction.- Wireless Network Overview.- Sensing Networks.- WSN Overview.- WBAN Overview.- WSN and Embedding System Relation.- Wireless Sensing Networks Contents.- .Wireless, Mobile, and Ad-hoc Networks.- .Book Organizing.- . SENSING AND ENVIRONMENT CONCEPTS.- Introduction.-  Sensing Definition.- Environment Concepts.- WSN and Environment.- Environment and Medical Care Concerns.- WSNs and Sensors.- Sensing Examples.- WIRELESS NETWORKS.- Introduction.-  Low-Rate Wireless Networks.- Bluetooth Networks Architecture.- Adaptive packets of WPAN technology.- THROUGHPUT STUDY OF LOW-RATE COMMUNICATIONS.- Introduction.-  Related Work.- Throughput Definition of WSN and WBAN.- Analysis of PEP.- The Proposed Scenarios.- Simulation Assumptions.- Simulation Results.- Chapter Recommendation.- WSN SECURITY NEEDS.- Introduction.- Security goals.- Fundamentals of Network Security.- Challenges of WSN Security.- WSN Implementation Technologies.- Summary.- LOWER COMPLEXITY OF SECURED WSN NETWORKS.- Power with FEC.- Complexity FEC dependant.- Interleaving Techniques.-  Interleavers Investigation.- Chaotic Interleaver Structure.- Cryptography using Chaos.- Objective quality Metrics.- Jakes Method.- Mobility Effects.- Cooperative Algorithm of WSN.- Appendixes.

Reviews

Author Information

Name: MOHSEN AHMED MAHMOUD MOHAMED KASSEM EL-BENDARY. Date of birth: 20-9-1975. Phone: 002-02-33266239 Mobile: 0020-128-8712859 0020-106-0747274 Affiliation: Department of Electronics and Communications Technology, Faculty of Industrial Education, Helwan University, Cairo, Egypt. Qualifications: 1- BSc. in Electrical Communications, Faculty of Electronic Engineering, Menoufia University, May 1998. 2- MSc. in Electrical Communications “Improving Performance Bluetooth Networks through Channel Codding ”, Faculty of Electronic Engineering, Menoufia University, 2008. 3- PhD. in Electrical Communications “Efficient Multimedia Transmission over Bluetooth System”, Faculty of Electronic Engineering, Menoufia University, 2012.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

lgn

al

Shopping Cart
Your cart is empty
Shopping cart
Mailing List