Ebsco publishing ebook collection ebscohost printed

Info icon This preview shows pages 7–10. Sign up to view the full content.

View Full Document Right Arrow Icon
EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Preface vii Privacy Part II, Privacy , focuses on the threat to the privacy of information and to the privacy of the participants routing the information. Chapter 4 presents a taxonomy of privacy types and discusses how to measure privacy. The authors then focus on location privacy, discussing issues unique to ad hoc, vehicular, and sensor networks while highlighting the state-of-the-art in each area. Chapter 4 concludes with an analytical methodology for the performance evaluation of location privacy solutions. The model accounts for network performance deterioration and other costs associated with location privacy. Chapter 5 proposes an anonymizing routing protocol that seeks to preserve topology and location privacy of ad hoc networks. Using bloom filters, the authors enable anonymity of the source and destination nodes and prevent forwarding nodes from inferring other nodes participating in the route. The authors compare the performance of their protocol to the Ad hoc On Demand Distance Vector (AODV) protocol. The use of wireless sensor networks is emerging in healthcare as a viable solution for continuously and automatically monitoring vital signs in patients. The application of sensor networks to Tele-medicine requires even more restrictive requirements, both legally and technically. Such systems must comply with safeguards (e.g., Health Insurance Portability and Accountability Act (HIPAA)) for protecting the confidentiality and privacy of health information. From a technical point of view, Tele- medicine sensors must have lower complexity and energy consumption and are less tolerant of transmission errors than other sensor networks. Chapter 6 proposes a medical privacy-preserving scheme based on NTRU algorithms. The authors present a hardware implementation and a series of optimizations to achieve the required operation speed and low power dissipation. The authors evaluate the performance of their design for a cardiac sensor network. Reliability Part III, Reliability , is about the ability of ad hoc and sensor networks to continue operation in the presence of faults that manifest as malfunctions Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 8
Preface viii or malicious attacks. Chapter 7 examines the sources and patterns of faults in sensor networks and identifies metrics for fault tolerance.
Image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern