Skip to main content

Security in Wireless Sensor Networks

  • Chapter
Wireless Network Security

Abstract

As wireless sensor networks edge closer towards wide-spread deployment, security issues become a central concern. However, the more challenging it becomes to fit the security of WSN into that constrained environment including very limited energy resources, low abilities to resist physical attacks, and lack of feedback mechanisms for abnormal cases off-line. Thus the research of security issues in WSN is very important. The intent of this chapter is to investigate the security related issues in wireless sensor networks. Firstly, the security architecture of sensor networks is proposed, trying to outline a general illustration on this area. Then, the following four aspects are investigated.

  1. (1)

    The cryptographic mechanisms.

  2. (2)

    Various keying mechanisms for the key management issue.

  3. (3)

    A panoramic view and detailed analysis of the trust management.

  4. (4)

    A set of effective strategies based on protecting location privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li P, Lin Y P, Zeng W N (2006) Search on security in sensor networks. Journal of Software, 17 (12): 2577–2588.

    Article  MATH  Google Scholar 

  2. Chong C Y, Kumar S P (2003) Sensor networks: Evolution, opportunities, and challenges. Proceeding of the IEEE, 91(8): 1247–1256.

    Article  Google Scholar 

  3. Huang L, Liu L (2008) Extended Watchdog Mechanism for Wireless Sensor Networks. Journal of Information and Computing Science, 3(1): 39–48.

    Google Scholar 

  4. Roman R, Zhou J, Lopez J (2005) On the Security of Wireless Sensor Networks. In Proceedings of 2005 ICCSA Workshop on Internet Communications Security, LNCS 3482, pp. 681–690.

    Google Scholar 

  5. Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: Attacks and countermeasures. In Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications Anchorage.

    Google Scholar 

  6. Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Communications of the ACM, 47(6).

    Google Scholar 

  7. Pathan ASK, Lee H-W, Hong C S (2006) Security in wireless sensor networks: issues and challenges. Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference, 2(20–22).

    Google Scholar 

  8. Nagai C H (2006) Intrusion Detection for Wireless Sensor Networks. Ph.D. Term 2 Paper, The Chinese University of Hong Kong. Department of Computer Science and Engineering. www.cse.cuhk.edu.hk/≈lyu/student/phd/edith/edith term2.pdf. Accessed 19 June, 2011.

    Google Scholar 

  9. Islam M S, Khan R H, Bappy D M (2010) A Hierarchical Intrusion Detection System in Wireless Sensor Networks. IJCSNS International Journal of Computer Science and Network Security, 10(8).

    Google Scholar 

  10. Wood A D, Stankovic J A (2002) Denial of Service in Sensor Networks. Computer, 35(10): 54–62.

    Article  Google Scholar 

  11. Anderson R, Kuhn M (1996) Tamper Resistance a Cautionary Note. In Proceedings of 2nd Usenix Workshop Electronic Commerce, pp. 1–11.

    Google Scholar 

  12. Johnson D B, Maltz D A (1996) Dynamic Source Routing in Ad Hoc Wireless Networks. Mobile Computing, vol. 353, T. Imielinski and H. Korth, eds., Kluwer Academic, pp. 153–181.

    Google Scholar 

  13. Karp B, Kung H T (2000) GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. In Proc. of 6th Ann. Int’l Conf. Mobile Computing and Networking (MobiCom 2000), ACM Press, New York, pp. 243–254.

    Chapter  Google Scholar 

  14. Perkins C E, Bhagwat P (1994) Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In Proc. of SIGCOMM, ACM Press, New York, pp. 234–244.

    Google Scholar 

  15. Cheung S, Levitt K N (1997) Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection. Proc. Workshop New Security Paradigms, ACM Press, New York, pp. 94–106.

    Google Scholar 

  16. Schuba C L (1997) Analysis of a Denial of Service Attack on TCP. In Proc. of IEEE Symp. Security and Privacy, IEEE Press, Piscataway, N. J., pp. 208–223.

    Google Scholar 

  17. Perrig A, Szewczyk R, Wen V, Culler D, Tygar J D (2001) SPINS: Security protocols for sensor networks. In Proc. of the 7th Annual Int’l Conf. on Mobile Computing and Networks. ACM Press, New York, pp. 189–199.

    Google Scholar 

  18. Zhu S, Setia S, Jajodia S (2003) LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proc. of the 10th ACM Conf. on Computer and Communications Security (CCS 2003), pp. 62–72.

    Google Scholar 

  19. Chan H, Perrig A, Song D (2003). Random key predistribution schemes for sensor networks. In Proc. of the IEEE Symp. on Research in Security and Privacy. IEEE Computer Society, pp. 197–213.

    Google Scholar 

  20. Li P, Lin Y P (2006) Search on security in sensor networks. Journal of Software, 17(12): 2577–2588.

    Article  MATH  Google Scholar 

  21. Zhang X Y, Heys H M, Li C (2010) Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks. Communications (QBSC), 2010 25th Biennial Symposium on Digital Object Identifier: 10.1109/BSC.2010.5472979

    Google Scholar 

  22. Goldwasser S, Micali S (1984) Probabilistic encryption. Journal of Computer Security, 28: 270–299.

    MathSciNet  MATH  Google Scholar 

  23. Ren K, Yu S, Lou W, Zhang Y (2009) Multi-user broadcast authentication in wireless sensor networks. IEEE Transactions on Vehicular Technology, 58(8): 4554–4564.

    Article  Google Scholar 

  24. Menezes A J, Van Oorschot P C., Vanstone S A (1996) Handbook of applied cryptology. Retrieved from http:/www.cacr.math.uwaterloo.ca/hac/about/chap10.pdf. Accessed 19 June, 2011.

    Google Scholar 

  25. Shih W, Hu W, Corke P, Overs L (2008) A public key technology platform for wireless sensor networks. In Proceedings of the 6th ACM conference on Embedded Network Sensor Systems, pp. 447–448.

    Google Scholar 

  26. Schmidl G, Rossi F (2010) A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks. CNSA 2010, CCIS 89, pp. 452–462. Springer-Verlag, Heidelberg.

    Google Scholar 

  27. Huang Q, Cukier J, Kobayashi H, Liu B D, Zhang J Y (2003) Fast authenticated key establishment protocols for wireless sensor networks. In Proc. of the 2nd ACM Int’l Conf. on Wireless Sensor Networks and Applications. San Diego: ACM press, New York, pp. 141–150.

    Google Scholar 

  28. Szczechowiak P, Oliveira L, Scott M, Collier M, Dahab R (2008) Nanoecc: testing the limits of elliptic curve cryptography in sensor networks. In Proceedings of European Conference on Wireless Sensor Networks (EWSN ′08), pp. 305–320, Springer, New York.

    Chapter  Google Scholar 

  29. Azarderskhsh R, Reyhani-Masoleh Arash (2011) Secure Clustering and Symmetric Key Establishment in Heterogeneous Wireless Sensor Networks. EURASIP Journal on Wireless Communications and Networking. Volume 2011, Article ID 893592, 12 pages. DOI: 10.1155/2011/893592.

    Google Scholar 

  30. Malan D J, Welsh M, Smith M D (2004) A public-key infrastructure for key distribution in Ting OS based on elliptic curve cryptography. Retrieved from http://airclic.eecs.har vard.edu/publications/secon04. pdf. Accessed 19 June, 2011.

    Google Scholar 

  31. Crossbow I (2008). Technology MICA2: Wireless measurement system. http://www.xbow.com/Products/Product pdf files/Wireless pdf/6020-0042-04 MICA2.pdf. Accessed 19 June, 2011

    Google Scholar 

  32. Du W L, Wang R H, Ning P (2005) An efficient scheme for authenticating public keys in sensor networks. In Proc. of the 6th ACM Int’l Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc 2005), pp. 58–67. ACM press, New York.

    Chapter  Google Scholar 

  33. Su Z, Lin C, Feng F J, Ren F Y (2007) Key management schemes and protocols for wireless sensor networks. Journal of Software, 18(5): 1218–1231.

    Article  MATH  Google Scholar 

  34. Eschenauerl L, Gligor V D (2002) A key-management scheme for distributed sensor networks. In proceedings of the 9th ACM Conference on Computer and Communications Security (CCS’02).

    Google Scholar 

  35. Du W L, Deng J, Han Y H, Chen S G, Varshney P K (2004) A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In Proceedings of IEEE INFOCOM 2004.

    Google Scholar 

  36. Blundo C, Santis A D, Herzberg A, Kutten S, Vaccaro U, Yung M (1992) Perfectly Secure key distribution for dynamic conferences. In Crypto.

    Google Scholar 

  37. Du W L, Ning P (2003) Establishing pairwise keys in distributed sensor networks. CCS’03.

    Google Scholar 

  38. Du W L, Deng J, Han Y S, Varshney P, Katz J, Khalili A (2003) A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks. CCS’03.

    Google Scholar 

  39. Curiac D, Plastoi M (2009) Combined Malicious Node Discovery and Self-Destruction Technique for Wireless Sensor Networks. IEEE DOI 10.1109/ SENSORCOMM.2009.72.

    Google Scholar 

  40. Dong H, Guo Y, Yu Z Q, Chen H (2009) A Wireless Sensor Networks Based on Multiangle Trust of Node. 2009 International Forum on Information Technology and Applications.

    Google Scholar 

  41. Viljanen L (2005) Towards an Ontology of Trust. In Proceedings of the Trust Bus 2005, LNCS 3592, pp. 175–184.

    Google Scholar 

  42. Crosby G V, Pissinou N, Gadze J (2006) A Framework for Trust-based Cluster Head Election in Wireless Sensor Networks. In Proceedings of Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems, pp. 13–22.

    Google Scholar 

  43. Ganeriwal S, Balzano L K, Srivastava M B (2008) Reputation-Based Framework for High Integrity Sensor Networks. ACM Trans. Sens. Netw. 4, 1–37.

    Article  Google Scholar 

  44. Tang W, Hu J B, Chen Z (2005) Research on a Fuzzy Logic-Based Subjective Trust Management Model. J. Comput. Res. Develop. 42, 1654–1659.

    Article  Google Scholar 

  45. Krasniewski M, Varadharajan P, Rabeler B, Bagchi S, Hu Y C (2005) TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks. In Proceedings of the 2005 International Conference on Dependable Systems and Networks, pp. 672–681.

    Google Scholar 

  46. Song F, Zhao B H (2008) Trust-Based LEACH Protocol for Wireless Sensor Networks. In Proceedings of the Second International Conference on Future Generation Communication and Networking, pp. 202–207.

    Google Scholar 

  47. Tanachaiwiwat S, Dave P, Bhindwale R, Helmy A (2003) Secure Locations: Routing on Trust and Isolating Compromised Sensors in Location-aware Sensor Networks. In Proceedings of the SenSys, pp. 324–325. Sensors 2011, 111360.

    Google Scholar 

  48. Tanachaiwiwat S, Dave P, Bhindwale R, Helmy A (2004) Location-Centric Isolation of Misbehavior and Trust Routing in Energy-Constrained Sensor Networks. In Proceedings of the 23rd IEEE International Performance, Computing, and Communications Conference, pp. 463–469.

    Google Scholar 

  49. Hur J, Lee Y, Hong S M, Yoon H (2005) Trust Management for Resilient Wireless Sensor Networks. In Proceedings of the 8th International Conference on Information Security and Cryptology, pp. 56–68.

    Google Scholar 

  50. Hur J, Lee Y, Yoon H, Choi D, Jun S (2005) Trust Evaluation Model for Wireless Sensor Networks. In Proceedings of the 7th International Conference on Advanced Communication Technology, pp. 491–496.

    Google Scholar 

  51. Almenarez F, Marin A, Diaz D, Sanchez J (2006) Developing a Model for Trust Management in Pervasive Devices. In Proceedings of 4th IEEE Annual International Conference on Pervasive Computing and Communications, pp. 267–271.

    Google Scholar 

  52. Almenarez F, Marin A, Campo C, Garcia R C (2004) PTM: A Pervasive Trust Management Model for Dynamic Open Environments. In Proceedings of the 1st Workshop on Pervasive Security, Privacy and Trust.

    Google Scholar 

  53. Almenarez F, Marin A, Campo C, Garcia RC (2005) Trust AC: Trust-based Access Control for Pervasive Devices. In Proceedings of the 2nd International Conference on Security in Pervasive Computing, pp. 225–238.

    Google Scholar 

  54. Hsieh M Y, Huang Y M, Chao H C (2007) Adaptive Security Design with Malicious Node Detection in Cluster-Based Sensor Networks. Comput. Commun. 30, pp. 2385–2400.

    Article  Google Scholar 

  55. Marmol F G, Perez G M (2010) Towards Pre-standardization of Trust and Reputation Models for Distributed and Heterogeneous Systems. Comput. Stand. Interfaces 2010, 32, pp. 185–196.

    Article  Google Scholar 

  56. Lopez J, Roman R, Agudo I, Fernandez C G (2010) Trust Management Systems for Wireless Sensor Networks: Best Practices. Comput. Commun. 33, pp. 1086–1093.

    Article  Google Scholar 

  57. Li J L, Gu L Z, Yang Y X (2009) A New Trust Management Model for P2P Networks. J. Beijing Univ. Posts Telecommun. 32, pp. 71–74.

    Article  Google Scholar 

  58. Li J L, Gu L Z, Yang Y X (2009) A New Trust Management Model for P2P Networks with Time Self-Decay and Subjective Expect. J. Electron. Inf. Technol. 31, pp. 2786–2790.

    Google Scholar 

  59. Li L, Fan L, Hui H (2009) Behavior-Driven Role-Based Trust Management. J. Softw. 20, pp. 2298–2306.

    Article  Google Scholar 

  60. Feng R, Xu X F, Zhou X, Wan J W (2011) A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory. Sensors 2011, 11, pp. 1345–1360; doi:10.3390/s110201345.

    Google Scholar 

  61. Carman D, Kruus P, Matt B (2000) Constraints and approaches for distributed sensor network security. Technical Report #00-010. NAI Labs. http://www.csee.umbc.edu/courses/graduate/CMSC691A/Spring04/papers/nailabsreport00-010final.pdf. Accessed 9 December, 2010.

    Google Scholar 

  62. Yi O, Le Z Y, Chen G, Ford J, Makedon F (2006) Entrapping adversaries for source protection in sensor networks. World of Wireless, Mobile and Multimedia Networks, WoWMoM 2006. International Symposium.

    Google Scholar 

  63. Doumit S, Agrawal D P (2003) Self-Organized criticality and stochastic learning-based intrusion detection system for wireless sensor networks. MILCOM 2003—IEEE Military Communications Conf., 22(1): 609–614.

    Google Scholar 

  64. Marti S, Giuli T, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In proc. ACM MobiCom, pp. 255–265.

    Google Scholar 

  65. Khalil I, Bagchi S, Shroff N B (2005) LiteWorp: a lightweight countermeasure for the wormhole attack in multihop wireless networks. In International Conference on Dependable Systems and Networks (DSN), pp. 612–621.

    Google Scholar 

  66. Wang X, Xu J, Wang J (2009) Detection and location of malicious nodes based on source coding and multi-path transmission in WSN. High Performance Computing and Communications, HPCC’ 09. 11th IEEE International Conference.

    Google Scholar 

  67. Wang X, Wong J (2007) An End-to-end Detection of Wormhole Attack in Wireless Ad Hoc Networks. In Proceedings of the 31st Annual International Computer Software and Applications Conference-Vol. 1-(COMPSAC 2007).

    Google Scholar 

  68. R. da Silva A, Martins M, Rocha B (2005) Decentralized Intrusion Detection in Wireless Sensor Networks. In Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet’ 05), pp. 16–22.

    Google Scholar 

  69. Tseng C-Y, Balasubramanyam P, Ko C, Limprasittiporn R, Rowe J, Levitt K (2003) A specification-based intrusion detection system for AODV. In Proceedings of the 1st ACM workshop on Security of Ad Hoc and sensor networks.

    Google Scholar 

  70. Momani M, Agbinya J, Navarrete G P, Akache M (2006) A New Algorithm of Trust Formation inWireless Sensor Networks. In The 1st IEEE International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless’ 06).

    Google Scholar 

  71. Yao Z Y, Kim D Y, Lee I (2005) A security framework with trust management for sensor networks. In Proc. of the 1st IEEE/CREATE-NET Workshop on Security and QoS in Communication Networks Athens. Piscataway, IEEE Computer Society, pp. 190–198.

    Google Scholar 

  72. Yao Z Y, Kim D, Doh Y (2006) PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proc. of the IEEE Int’l Conf. on Mobile Ad Hoc and Sensor Systems (MASS). Piscataway, IEEE Computer Society, pp. 437–446.

    Google Scholar 

  73. Shaikh R A, Jameel H, Lee S, Rajput S, Song Y J (2006) Trust management problem in distributed wireless sensor networks. In Proc. of the RTCSA. Piscataway, IEEE Computer Society, pp. 411–414.

    Google Scholar 

  74. Ryutov T, Neuman C (2007) Trust based approach for improving data reliability in industrial sensor networks. In Etalle S, eds. In Proc. of the IFIP Int’l Federation for Information, 238: 349–365.

    Google Scholar 

  75. Probst M J, Kasera S K (2007) Statistical trust establishment in wireless sensor networks. In Proc. of the Int’l Conf. on Parallel and Distributed Systems. IEEE Computer Society, pp. 1–8.

    Google Scholar 

  76. Agah A, Das S K, Basu K (2004) A game theory based approach for security in wireless sensor networks. In Proc. of the IEEE Int’l Conf. on Performance, Computing and Communications. Piscataway, IEEE Computer Society, pp. 259–263.

    Google Scholar 

  77. Blaze M, Feigenbaum J, Lacy J (2002) Decentralized Trust Management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164–173.

    Google Scholar 

  78. Ellison C M, Frantz B, Lampson B, Rivest R, Thomas B M, Ylonen T (2010) Simple Public Key Infrastructure Certificate Theory. Retrieved from http://www.ietf.org/ietf/1id-abstracts.txt. Accessed 9 December, 2010.

    Google Scholar 

  79. Li N H, Mitchell J C (2003) RT: A Role-Based Trust-management Framework. In Proceedings of the 3rd DARPA Information Survivability Conference and Exposition, pp. 201–212.

    Google Scholar 

  80. Li N H, Mitchell J C, Winsborough WH (2005) Beyond Proof-of-Compliance: Security Analysis in Trust Management. J. ACM, 52, 474–514.

    Article  MathSciNet  Google Scholar 

  81. Josang A, Ismail R (2002) The Beta Reputation System. In proceeding of 15th Bled Electronic Commerce Conference, pp. 17–19.

    Google Scholar 

  82. Srinivasan A, Teitelbaum J, Wu J (2006) Distributed Reputation-based Beacon Trust System. In Proceedings of 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 277–283.

    Google Scholar 

  83. Josang A, Ismail R, Boyd C (2007) A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems, pp. 618–644.

    Google Scholar 

  84. Wagner D (2004) Resilient aggregation in Sensor Networks, In Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks, pp. 78–87.

    Google Scholar 

  85. Capkun S, Srivastava M, Cagalj M (2006) Securing localization with hidden and mobile base stations. In INFOCOM 2006.

    Google Scholar 

  86. Lazos L, Poovendran R (2004) SeRLoc: Secure range-independent localization for wireless sensor networks. In ACM WiSe 2004.

    Google Scholar 

  87. Lazos L, Poovendran R, Capkun S (2005) ROPE: Robust position estimation in wireless sensor networks. In IPSN 2005.

    Google Scholar 

  88. Li Z, Trappe W, Zhang Y, Nath B (2005) Robust statistical methods for securing wireless localization in sensor networks. In IPSN 2005.

    Google Scholar 

  89. Liu D, Ning P, Du W (2005) Attack-resistant location estimation in sensor networks. In IPSN 2005.

    Google Scholar 

  90. Sastry N, Shankar U, Wagner D (2003) Secure verification of location claims. In ACM Wise 2003.

    Google Scholar 

  91. Capkun S, Hubaux J P (2005) Secure positioning of wireless devices with application to sensor networks. In INFOCOM 2005.

    Google Scholar 

  92. Vora A, Nesterenko M (2004) Secure location verification using radio broadcast. In International Conference on Principles of Distributed Systems.

    Google Scholar 

  93. Kamat P, Zhang Y, Trappe W (2005) Enhancing Source-Location Privacy in Sensor Network Routing. In Proc. of IEEE ICDCS’ 05.

    Google Scholar 

  94. Xi Y, Schwiebert L, Shi W (2006) Preserving location privacy in monitoring based wireless sensor networks. In Proceedings of the 2th International Workshop on Security in Systems and Networks (SSN’06). IEEE Computer Society.

    Google Scholar 

  95. Yao J, Wen G (2008) Preserving Source-Location Privacy in Energy Constrained Wireless Sensor Networks. In Proc. of ICDCS 2008 workshops. IEEE Press.

    Google Scholar 

  96. Ozturk C, Zhang Y, Frappe W (2004) Source-location privacy for networks of energy constrained sensors. In Proceedings of 2nd IEEE Workshop off Software Technologies for Future Embedded and Ubiquitous Systems (WSTFEUS04), pp. 68–72.

    Google Scholar 

  97. Braginsky D, Estrin D (2002) Rumor routing algorthim for sensor networks. In Proceedings of the 1st ACM international workshop on wireless sensor networks and applications.

    Google Scholar 

  98. Eugster P T H, Guerraoui R, Handurukande S B, Kouznetsov P, Kermarrec A-M (2003) Lightweight probabilistic broadcast. ACM Transactions on Computer Systems (TOCS), 21(4): 341–374.

    Article  Google Scholar 

  99. Shao M, Yang Y, Zhu S (2008) Towards Statistically Strong Source Anonymity for Sensor Networks. In Proc. of IEEE INFOCOM’ 08.

    Google Scholar 

  100. Yang Y, Shao M, Zhu S (2008) Towards event source unobservability with minimum network traffic in sensor networks. In Proc. of ACM WiSec’08.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Higher Education Press, Beijing and Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Li, P., Sun, L., Fu, X., Ning, L. (2013). Security in Wireless Sensor Networks. In: Wireless Network Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36511-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36511-9_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36510-2

  • Online ISBN: 978-3-642-36511-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics