Author(s) Name:  Adrian Perrig, J.D. Tygar
This book discusses how to realize Secure Broadcast Communication operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop.
The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols.
The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.
Table of Contents
Publisher:  Springer Science & Business Media
Year of Publication:  2003
Book Link:  Home Page Url