Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Securing Emerging Wireless Systems

Best Price (Coupon Required):
Buy Securing Emerging Wireless Systems for $76.50 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $84.99 - $84.99
BEST PRICE

Single Product Purchase

$76.50
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$84.99 $84.99

10% OFF
This deals requires coupon
$76.50
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9780387884912
Condition
New
Product Description

Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a collection of defense mechanisms that operate at the lower-layers of the protocol stack and can defend wireless systems before the effects of attacks propagate up to higher-level applications and services. The book will focus on fundamental security problems that involve properties unique to wireless systems, such as the characteristics of radio propagation, or the location of communicating entities, or the properties of the medium access control layer. Specifically, the book provides detection mechanisms and highlights defense strategies that cope with threats to wireless localization infrastructure, attacks on wireless networks that exploit entity identity (i.e. spoofing attacks), jamming and radio interference that can undermine the availability of wireless communications, and privacy threats where an adversary seeks to infer spatial and temporal contextual information surrounding wireless communications. Additionally, the authors explore new paradigms of physical layer security for wireless systems, which can support authentication and confidentiality services by exploiting fading properties unique to wireless communications.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Messer, Gabel, Reissverschluss

Messer, Gabel, Reissverschluss

$49.99
Buxton Chronicles: The Madman of Piney Woods

Buxton Chronicles: The Madman of Piney Woods

$6.74
Paleoalgology

Paleoalgology

$84.99
Lesesozialisation in der Familie

Lesesozialisation in der Familie

$49.99
Innovations in Macroeconomics

Innovations in Macroeconomics

$89.00
Photometric and Spectroscopic Binary Systems

Photometric and Spectroscopic Binary Systems

$219.99
Systems  Engineering and Artificial Intelligence

Systems Engineering and Artificial Intelligence

$139.00
Harmonic Analysis on Semigroups

Harmonic Analysis on Semigroups

$39.99
Pilauco: A Late Pleistocene Archaeo-paleontological Site

Pilauco: A Late Pleistocene Archaeo-paleontological Site

$79.99
Umformtechnik

Umformtechnik

$34.99
German-Turkish Perspectives on IT and Innovation Management

German-Turkish Perspectives on IT and Innovation Management

$39.99
Rethinking the Education Mess: A Systems Approach to Education Reform

Rethinking the Education Mess: A Systems Approach to Education Reform

$54.99
Cardiovascular Aspects of Dialysis Treatment

Cardiovascular Aspects of Dialysis Treatment

$109.99
Organisationale Umweltbeobachtung

Organisationale Umweltbeobachtung

$69.99
Pattern Recognition and Computer Vision

Pattern Recognition and Computer Vision

$39.99
The Risk of Water Conflicts in Aotearoa-New Zealand

The Risk of Water Conflicts in Aotearoa-New Zealand

$159.99
Tumor Microenvironment and Cellular Stress

Tumor Microenvironment and Cellular Stress

$169.00
Molecular Approaches to Improving Food Quality and Safety

Molecular Approaches to Improving Food Quality and Safety

$39.99
Diagrammatic Representation and Inference

Diagrammatic Representation and Inference

$54.99
Schmerzdokumentation in der Praxis

Schmerzdokumentation in der Praxis

$19.99
Philosophical Reflections on Medical Ethics

Philosophical Reflections on Medical Ethics

$54.99
Dickens

Dickens

$39.99
Hocheskalierte Elternkonflikte nach Trennung und Scheidung

Hocheskalierte Elternkonflikte nach Trennung und Scheidung

$17.99
Experimental Economics: Financial Markets, Auctions, and Decision Making

Experimental Economics: Financial Markets, Auctions, and Decision Making

$109.99
Carnal Inscriptions

Carnal Inscriptions

$54.99
Reminiscences of the Vienna Circle and the Mathematical Colloquium

Reminiscences of the Vienna Circle and the Mathematical Colloquium

$109.99
Das Linux-Tutorial - Ihr Weg zum LPI-Zertifikat

Das Linux-Tutorial - Ihr Weg zum LPI-Zertifikat

$54.99
Betrieblicher Einsatz Computeruntersttzten Lernens

Betrieblicher Einsatz Computeruntersttzten Lernens

$69.99
Determinanten der Demokratiezufriedenheit

Determinanten der Demokratiezufriedenheit

$49.99
Psychosocial Imaginaries

Psychosocial Imaginaries

$24.99
Evolution of Jaw Mechanisms in Ornithopod Dinosaurs

Evolution of Jaw Mechanisms in Ornithopod Dinosaurs

$109.99
Modelling and Development of Intelligent Systems

Modelling and Development of Intelligent Systems

$69.99
Introduction to Statistics for the Social Sciences

Introduction to Statistics for the Social Sciences

$74.99
Mobile Marketing

Mobile Marketing

$44.99
The Night Before Summer Vacation

The Night Before Summer Vacation

$2.99
Isoperimetric Inequalities in Riemannian Manifolds

Isoperimetric Inequalities in Riemannian Manifolds

$179.99
Trends in Artificial Intelligence

Trends in Artificial Intelligence

$39.99
The Legal Status of the Caspian Sea

The Legal Status of the Caspian Sea

$74.99
Essentials of Stochastic Processes

Essentials of Stochastic Processes

$49.99
Programmieren mit FORTH

Programmieren mit FORTH

$49.99
previous
next