Harsh Kupwade Patil, Stephen A. Szygenda
About the Book
The book introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.
Year of Publication