13 Chapter 13Figure 13.1 IEEE 802.15.6 security hierarchy [1].Figure 13.2 A DES structure.Figure 13.3 A DES round function.Figure 13.4 An AES structure.Figure 13.5 The process steps of the first round.
14 Chapter 14Figure 14.1 Popular network topologies: (a) peer-to-peer; (b) star topology ...Figure 14.2 (a) Mica2 mote with its sensor board; (b) MicaZ mote.Figure 14.3 TelosB mote.Figure 14.4 IRIS Mote: (a) top and (b) back views.Figure 14.5 iSense core.Figure 14.6 Preon32 wireless module.Figure 14.7 Wasp mote.Figure 14.8 WiSense mote.Figure 14.9 panStamp NRG 3 mote.Figure 14.10 Jennic JN5139-Z01.
Guide
1 Cover
2 Table of Contents
Pages
1 iii
2 iv
3 xiii
4 xiv
5 xv
6 1
7 2
8 3
9 4
10 5
11 6
12 7
13 8
14 9
15 10
16 11
17 12
18 13
19 14
20 15
21 17
22 18
23 19
24 20
25 21
26 22
27 23
28 24
29 25
30 26
31 27
32 28
33 29
34 30
35 31
36 32
37 33
38 35
39 36
40 37
41 38
42 39
43 40
44 41
45 42
46 43
47 44
48 45
49 46
50 47
51 48
52 49
53 50
54 51
55 52
56 53
57 54
58 55
59 56
60 57
61 59
62 60
63 61
64 62
65