
This book covers a comprehensive discussion on the state of the art in security technologies for wireless sensor networks. It identifies various possible attacks at different layers of the communication protocol stack in a typical wireless sensor network and presents their possible countermeasures.
Nous publions uniquement les avis qui respectent les conditions requises. Consultez nos conditions pour les avis.