Free Essay

Merger Integration at Boa

In:

Submitted By ajthokare
Words 5174
Pages 21
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 4, No. 1 & 2, 2009

A Survey of Attacks, Security Mechanisms and
Challenges in Wireless Sensor Networks
Dr. G. Padmavathi,

Mrs. D. Shanmugapriya,

Prof and Head,
Dept. of Computer Science,
Avinashilingam University for Women,
Coimbatore, India, ganapathi.padmavathi@gmail.com Lecturer,
Dept. of Information Technology,
Avinashilingam University for Women,
Coimbatore, India, ds_priyaa@rediffmail.com Abstract—Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. The sensing technology combined with processing power and wireless communication makes it profitable for being exploited in great quantity in future.
The wireless communication technology also acquires various types of security threats. This paper discusses a wide variety of attacks in WSN and their classification mechanisms and different securities available to handle them including the challenges faced.
Keywords-Wireless Sensor Network; Security
Security Attacks; Defensive mechanisms; Challenges

I.

Goal;



Public Safety: In applications where chemical, biological or other environmental threats are monitored, it is vital that the availability of the network is never threatened. Attacks causing false alarms may lead to panic responses or even worse total disregard for the signals.



Home Healthcare: In such applications, privacy protection is essential. Only authorized users should be able to query and monitor the network.

The major contribution of this paper includes classification of security attacks, security mechanisms and challenges in Wireless Sensor Networks. Section 2 gives the detailed information about the security goals in
Wireless Sensor Networks. Security attacks and their classification are discussed in section 3. Section 4 discusses about the various security mechanisms. Major challenges faced are given in Section 5 followed by the conclusion section.

INTRODUCTION

Basically, sensor networks are application dependent. Sensor networks are primarily designed for real-time collection and analysis of low level data in hostile environments. For this reason they are well suited to a substantial amount of monitoring and surveillance applications. Popular wireless sensor network applications include wildlife monitoring, bushfire response, military command, intelligent communications, industrial quality control, observation of critical infrastructures, smart buildings, distributed robotics, traffic monitoring, examining human heart rates etc. Majority of the sensor network are deployed in hostile environments with active intelligent opposition. Hence security is a crucial issue.
One obvious example is battlefield applications where there is a pressing need for secrecy of location and resistance to subversion and destruction of the network.
Less obvious but just as important security dependent applications include:


necessary to protect the location of casualties from unauthorized disclosure

Disasters: In many disaster scenarios, especially those induced by terrorist activities, it may be

II.

SECURITY GOALS FOR SENSOR NETWORKS

As the sensor networks can also operate in an adhoc manner the security goals cover both those of the traditional networks and goals suited to the unique constraints of adhoc sensor networks. The security goals are classified as primary and secondary [5]. The primary goals are known as standard security goals such as
Confidentiality, Integrity, Authentication and Availability
(CIAA). The secondary goals are Data Freshness, SelfOrganization, Time Synchronization and Secure
Localization.
The primary goals are:
A. Data Confidentiality
Confidentiality is the ability to conceal messages from a passive attacker so that any message communicated via the sensor network remains confidential. This is the most important issue in network security. A sensor node should not reveal its data to the neighbors.

ISSN 1947 5500

(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 4, No. 1 & 2, 2009

B. Data Authentication
Authentication ensures the reliability of the message by identifying its origin. Attacks in sensor networks do not just involve the alteration of packets; adversaries can also inject additional false packets [14]. Data authentication verifies the identity of the senders and receivers. Data authentication is achieved through symmetric or asymmetric mechanisms where sending and receiving nodes share secret keys. Due to the wireless nature of the media and the unattended nature of sensor networks, it is extremely challenging to ensure authentication.

F.

C. Data Integrity
Data integrity in sensor networks is needed to ensure the reliability of the data and refers to the ability to confirm that a message has not been tampered with, altered or changed. Even if the network has confidentiality measures, there is still a possibility that the data integrity has been compromised by alterations. The integrity of the network will be in trouble when:

G. Time Synchronization
Most sensor network applications rely on some form of time synchronization. Furthermore, sensors may wish to compute the end-to-end delay of a packet as it travels between two pairwise sensors. A more collaborative sensor network may require group synchronization [4] for tracking applications.



H. Secure Localization
Often, the utility of a sensor network will rely on its ability to accurately and automatically locate each sensor in the network. A sensor network designed to locate faults will need accurate location information in order to pinpoint the location of a fault. Unfortunately, an attacker can easily manipulate nonsecured location information by reporting false signal strengths, replaying signals.

A malicious node present in the network injects false data.



Self-Organization
A wireless sensor network is a typically an ad hoc network, which requires every sensor node be independent and flexible enough to be self-organizing and self-healing according to different situations. There is no fixed infrastructure available for the purpose of network management in a sensor network. This inherent feature brings a great challenge to wireless sensor network security. If self-organization is lacking in a sensor network, the damage resulting from an attack or even the risky environment may be devastating.

Unstable conditions due to wireless channel cause damage or loss of data.[4]

D. Data Availability
Availability determines whether a node has the ability to use the resources and whether the network is available for the messages to communicate. However, failure of the base station or cluster leader’s availability will eventually threaten the entire sensor network. Thus availability is of primary importance for maintaining an operational network. This Section has discussed about the security goals that are widely available for wireless sensor networks and the next section explains about the attacks that commonly occur on wireless sensor networks.
III. ATTACKS ON SENSOR NETWORKS
Wireless Sensor networks are vulnerable to security attacks due to the broadcast nature of the transmission medium. Furthermore, wireless sensor networks have an additional vulnerability because nodes are often placed in a hostile or dangerous environment where they are not physically protected. Basically attacks are classified as active attacks and passive attacks. Figure1 shows the classification of attacks under general categories and
Figure 2 shows the attacks classification on WSN.

The Secondary goals are:
E. Data Freshness
Even if confidentiality and data integrity are assured, there is a need to ensure the freshness of each message.
Informally, data freshness [4] suggests that the data is recent, and it ensures that no old messages have been replayed. To solve this problem a nonce, or another timerelated counter, can be added into the packet to ensure data freshness. 2

ISSN 1947 5500

(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 4, No. 1 & 2, 2009

Figure 1. General Classification of Security Attacks

Figure 2. Classification of Security Attacks on WSN

3

ISSN 1947 5500

(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 4, No. 1 & 2, 2009

1) Routing Attacks in Sensor Networks
The attacks which act on the network layer are called routing attacks. The following are the attacks that happen while routing the messages.

A. Passive Attacks
The monitoring and listening of the communication channel by unauthorized attackers are known as passive attack. The Attacks against privacy is passive in nature.

a) Spoofed, altered and replayed routing information • An unprotected ad hoc routing is vulnerable to these types of attacks, as every node acts as a router, and can therefore directly affect routing information. 1) Attacks against Privacy
The main privacy problem is not that sensor networks enable the collection of information. In fact, much information from sensor networks could probably be collected through direct site surveillance. Rather, sensor networks intensify the privacy problem because they make large volumes of information easily available through remote access. Hence, adversaries need not be physically present to maintain surveillance. They can gather information at low-risk in anonymous manner. Some of the more common attacks[8] against sensor privacy are:







Increase end-to-end latency [3]

b) Selective Forwarding
A malicious node can selectively drop only certain packets. Especially effective if combined with an attack that gathers much traffic via the node. In sensor networks it is assumed that nodes faithfully forward received messages. But some compromised node might refuse to forward packets, however neighbors might start using another route.[3]

Camouflage Adversaries: One can insert their node or compromise the nodes to hide in the sensor network. After that these nodes can copy as a normal node to attract the packets, then misroute the packets, conducting the privacy analysis.

c) Sinkhole Attack
Attracting traffic to a specific node in called sinkhole attack. In this attack, the adversary’s goal is to attract nearly all the traffic from a particular area through a compromised node. Sinkhole attacks typically work by making a compromised node look especially attractive to surrounding nodes. [3]
d) Sybil Attacks
A single node duplicates itself and presented in the multiple locations. The Sybil attack targets fault tolerant schemes such as distributed storage, multipath routing and topology maintenance. In a Sybil attack, a single node presents multiple identities to other nodes in the network.
Authentication and encryption techniques can prevent an outsider to launch a Sybil attack on the sensor network.[3]

B. Active Attacks
The unauthorized attackers monitors, listens to and modifies the data stream in the communication channel are known as active attack. The following attacks are active in nature. 1.
2.
3.
4.
5.
6.
7.
8.
9.
10.

Generate false error messages



Traffic Analysis: Even when the messages transferred are encrypted, it still leaves a high possibility analysis of the communication patterns.
Sensor activities can potentially reveal enough information to enable an adversary to cause malicious harm to the sensor network.



Extend or shorten service routes



Monitor and Eavesdropping: This is the most common attack to privacy. By snooping to the data, the adversary could easily discover the communication contents. When the traffic conveys the control information about the sensor network configuration, which contains potentially more detailed information than accessible through the location server, the eavesdropping can act effectively against the privacy protection.

Create routing loops

e) Wormholes Attacks
In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them into the network.[3]

Routing Attacks in Sensor Networks
Denial of Service Attacks
Node Subversion
Node Malfunction
Node Outage
Physical Attacks
Message Corruption
False Node
Node Replication Attacks
Passive Information Gathering

f) HELLO flood attacks
An attacker sends or replays a routing protocol’s
HELLO packets from one node to another with more energy. This attack uses HELLO packets as a weapon to convince the sensors in WSN. In this type of attack an attacker with a high radio transmission range and processing power sends HELLO packets to a number of sensor nodes that are isolated in a large area within a

4

ISSN 1947 5500

(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 4, No. 1 & 2, 2009

WSN. The sensors are thus influenced that the adversary is their neighbor. As a result, while sending the information to the base station, the victim nodes try to go through the attacker as they know that it is their neighbor and are ultimately spoofed by the attacker.[3]

7) Message Corruption
Any modification of the content of a message by an attacker compromises its integrity.[9]
8) False Node
A false node involves the addition of a node by an adversary and causes the injection of malicious data. An intruder might add a node to the system that feeds false data or prevents the passage of true data. Insertion of malicious node is one of the most dangerous attacks that can occur. Malicious code injected in the network could spread to all nodes, potentially destroying the whole network, or even worse, taking over the network on behalf of an adversary.[9]

2) Denial of Service
Denial of Service (DoS) is produced by the unintentional failure of nodes or malicious action. DoS attack is meant not only for the adversary’s attempt to subvert, disrupt, or destroy a network, but also for any event that diminishes a network’s capability to provide a service. In wireless sensor networks, several types of DoS attacks in different layers might be performed. At physical layer the DoS attacks could be jamming and tampering, at link layer, collision, exhaustion and unfairness, at network layer, neglect and greed, homing, misdirection, black holes and at transport layer this attack could be performed by malicious flooding and de-synchronization. The mechanisms to prevent DoS attacks include payment for network resources, pushback, strong authentication and identification of traffic.[2]

9) Node Replication Attacks
Conceptually, a node replication attack is quite simple; an attacker seeks to add a node to an existing sensor network by copying the nodeID of an existing sensor node.
A node replicated in this approach can severely disrupt a sensor network’s performance. Packets can be corrupted or even misrouted. This can result in a disconnected network, false sensor readings, etc. If an attacker can gain physical access to the entire network he can copy cryptographic keys to the replicated sensor nodes. By inserting the replicated nodes at specific network points, the attacker could easily manipulate a specific segment of the network, perhaps by disconnecting it altogether.[1]

3) Node Subversion
Capture of a node may reveal its information including disclosure of cryptographic keys and thus compromise the whole sensor network. A particular sensor might be captured, and information (key) stored on it might be obtained by an adversary. [6]

10) Passive Information Gathering
An adversary with powerful resources can collect information from the sensor networks if it is not encrypted.
An intruder with an appropriately powerful receiver and well-designed antenna can easily pick off the data stream.
Interception of the messages containing the physical locations of sensor nodes allows an attacker to locate the nodes and destroy them. Besides the locations of sensor nodes, an adversary can observe the application specific content of messages including message IDs, timestamps and other fields. To minimize the threats of passive information gathering, strong encryption techniques needs to be used.[8]

4) Node Malfunction
A malfunctioning node will generate inaccurate data that could expose the integrity of sensor network especially if it is a data-aggregating node such as a cluster leader [6].
5) Node Outage
Node outage is the situation that occurs when a node stops its function. In the case where a cluster leader stops functioning, the sensor network protocols should be robust enough to mitigate the effects of node outages by providing an alternate route [6].
6) Physical Attacks
Sensor networks typically operate in hostile outdoor environments. In such environments, the small form factor of the sensors, coupled with the unattended and distributed nature of their deployment make them highly susceptible to physical attacks, i.e., threats due to physical node destructions. Unlike many other attacks mentioned above, physical attacks destroy sensors permanently, so the losses are irreversible. For instance, attackers can extract cryptographic secrets, tamper with the associated circuitry, modify programming in the sensors, or replace them with malicious sensors under the control of the attacker.

This section explained about the attacks and their classification that widely happens on wireless sensor networks. The next section discusses about the security mechanisms that are used to handle the attacks.
IV. SECURITY MECHANISM
The security mechanisms are actually used to detect, prevent and recover from the security attacks. A wide variety of security schemes can be invented to counter malicious attacks and these can be categorized as highlevel and low-level. Figure 3 shows the order of security mechanisms. 5

ISSN 1947 5500

(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 4, No. 1 & 2, 2009

Figure3: Security mechanisms

wide shared key simplifies key setup and supports passive participation and local broadcast, but intermediate nodes might eavesdrop or alter messages. The earliest sensor networks are likely to use link layer cryptography, because this approach provides the greatest ease of deployment among currently available network cryptographic approaches.[6] A. Low-Level Mechanism
Low-level security primitives for securing sensor networks includes,
1.
2.
3.
4.
5.
6.

Key establishment and trust setup
Secrecy and authentication
Privacy
Robustness to communication denial of service
Secure routing
Resilience to node capture
1) Key establishment and trust setup
The primary requirement of setting up the sensor network is the establishment of cryptographic keys. Generally the sensor devices have limited computational power and the public key cryptographic primitives are too expensive to follow. Key-establishment techniques need to scale to networks with hundreds or thousands of nodes. In addition, the communication patterns of sensor networks differ from traditional networks; sensor nodes may need to set up keys with their neighbors and with data aggregation nodes. The disadvantage of this approach is that attackers who compromised sufficiently and many nodes could also reconstruct the complete key pool and break the scheme.[1]

3) Privacy
Like other traditional networks, the sensor networks have also force privacy concerns. Initially the sensor networks are deployed for legitimate purpose might subsequently be used in unanticipated ways. Providing awareness of the presence of sensor nodes and data acquisition is particularly important.
[1]
4) Robustness to communication denial of service
An adversary attempts to disrupt the network’s operation by broadcasting a high-energy signal. If the transmission is powerful enough, the entire system’s communication could be jammed. More sophisticated attacks are also possible; the adversary might inhibit communication by violating the
802.11 medium access control (MAC) protocol by, say, transmitting while a neighbor is also transmitting or by continuously requesting channel access with a request-tosend signal.[1]

2) Secrecy and authentication.
Most of the sensor network applications require protection against eavesdropping, injection, and modification of packets. Cryptography is the standard defense.
Remarkable system trade-offs arise when incorporating cryptography into sensor networks. For point-to-point communication[12], end-to-end cryptography achieves a high level of security but requires that keys be set up among all end points and be incompatible with passive participation and local broadcast. Link-layer cryptography with a network

5) Secure routing
Routing and data forwarding is a crucial service for enabling communication in sensor networks. Unfortunately, current routing protocols suffer from many security vulnerabilities. For example, an attacker might launch denialof-service attacks on the routing protocol, preventing communication. The simplest attacks involve injecting malicious routing information into the network, resulting in routing inconsistencies. Simple authentication might guard

6

ISSN 1947 5500

(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 4, No. 1 & 2, 2009

against injection attacks, but some routing protocols are susceptible to replay by the attacker of legitimate routing messages. [6]

V. CHALLENGES OF SENSOR NETWORKS
The nature of large, ad-hoc, wireless sensor networks presents significant challenges in designing security schemes. A wireless sensor network is a special network which has many constraint compared to a traditional computer network.

6) Resilience to node capture
One of the most challenging issues in sensor networks is resiliency against node capture attacks. In most applications, sensor nodes are likely to be placed in locations easily accessible to attackers. Such exposure raises the possibility that an attacker might capture sensor nodes, extract cryptographic secrets, modify their programming, or replace them with malicious nodes under the control of the attacker.
Tamper-resistant packaging may be one defense, but it’s expensive, since current technology does not provide a high level of security. Algorithmic solutions to the problem of node capture are preferable.[1]

A. Wireless Medium
The wireless medium is inherently less secure because its broadcast nature makes eavesdropping simple. Any transmission can easily be intercepted, altered, or replayed by an adversary. The wireless medium allows an attacker to easily intercept valid packets and easily inject malicious ones. Although this problem is not unique to sensor networks, traditional solutions must be adapted to efficiently execute on sensor networks. [7]

B. High-Level Mechanism
High-level security mechanisms for securing sensor networks, includes secure group management, intrusion detection, and secure data aggregation.

B. Ad-Hoc Deployment
The ad-hoc nature of sensor networks means no structure can be statically defined. The network topology is always subject to changes due to node failure, addition, or mobility.
Nodes may be deployed by airdrop, so nothing is known of the topology prior to deployment. Since nodes may fail or be replaced the network must support self-configuration.
Security schemes must be able to operate within this dynamic environment.

1) Secure group management
Each and every node in a wireless sensor network is limited in its computing and communication capabilities.
However, interesting in-network data aggregation and analysis can be performed by groups of nodes. For example, a group of nodes might be responsible for jointly tracking a vehicle through the network. The actual nodes comprising the group may change continuously and quickly. Many other key services in wireless sensor networks are also performed by groups. Consequently, secure protocols for group management are required, securely admitting new group members and supporting secure group communication. The outcome of the group key computation is normally transmitted to a base station. The output must be authenticated to ensure it comes from a valid group. [1]

C. Hostile Environment
The next challenging factor is the hostile environment in which sensor nodes function. Motes face the possibility of destruction or capture by attackers. Since nodes may be in a hostile environment, attackers can easily gain physical access to the devices. Attackers may capture a node, physically disassemble it, and extract from it valuable information (e.g. cryptographic keys). The highly hostile environment represents a serious challenge for security researchers.

2) Intrusion detection
Wireless sensor networks are susceptible to many forms of intrusion. Wireless sensor networks require a solution that is fully distributed and inexpensive in terms of communication, energy, and memory requirements. The use of secure groups may be a promising approach for decentralized intrusion detection.[1]

D. Resource Scarcity
The extreme resource limitations of sensor devices pose considerable challenges to resource-hungry security mechanisms. The hardware constraints necessitate extremely efficient security algorithms in terms of bandwidth, computational complexity, and memory. This is no trivial task. Energy is the most precious resource for sensor networks. Communication is especially expensive in terms of power. Clearly, security mechanisms must give special effort to be communication efficient in order to be energy efficient.
[5]

3) Secure data aggregation
One advantage of a wireless sensor network is the finegrain sensing that large and dense sets of nodes can provide.
The sensed values must be aggregated to avoid overwhelming amounts of traffic back to the base station.
For example, the system may average the temperature of a geographic region, combine sensor values to compute the location and velocity of a moving object, or aggregate data to avoid false alarms in real-world event detection. Depending on the architecture of the wireless sensor network, aggregation may take place in many places in the network.
All aggregation locations must be secured.[6]

E. Immense Scale
The proposed scale of sensor networks poses a significant challenge for security mechanisms. Simply networking tens to hundreds of thousands of nodes has proven to be a substantial task. Providing security over such a network is equally challenging. Security mechanisms must be scalable to very large networks while maintaining high computation and communication efficiency.

7

ISSN 1947 5500

(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 4, No. 1 & 2, 2009

survey will hopefully motivate future researchers to come up with smarter and more robust security mechanisms and make their network safer.

F. Unreliable Communication
Certainly, unreliable communication is another threat to sensor security. The security of the network relies heavily on a defined protocol, which in turn depends on communication.[5] •





REFERENCES
[1]

Unreliable Transfer: Normally the packet-based routing of the sensor network is connectionless and thus inherently unreliable.

[2]

Conflicts: Even if the channel is reliable, the communication may still be unreliable. This is due to the broadcast nature of the wireless sensor network.

[3]

Latency: The multi-hop routing, network congestion and node processing can lead to greater latency in the network, thus making it difficult to achieve synchronization among sensor nodes.

[4]

[5]

G. Unattended Operation
Depending on the function of the particular sensor network, the sensor nodes may be left unattended for long periods of time. There are three main cautions to unattended sensor nodes [5]:






[6]

[7]

Exposure to Physical Attacks: The sensor may be deployed in an environment open to adversaries, bad weather, and so on. The probability that a sensor suffers a physical attack in such an environment is therefore much higher than the typical PCs, which is located in a secure place and mainly faces attacks from a network.

[8]

[9]

Managed Remotely: Remote management of a sensor network makes it virtually impossible to detect physical tampering and physical maintenance issues. [10]

[11]

No Central Management Point: A sensor network should be a distributed network without a central management point. This will increase the vitality of the sensor network. However, if designed incorrectly, it will make the network organization difficult, inefficient, and fragile.

[12]

[13]

Perhaps most importantly, the longer that a sensor is left unattended the more likely that an adversary has compromised the node.

[14]

[15]

VI.

CONCLUSION
[16]

The deployment of sensor nodes in an unattended environment makes the networks vulnerable. Wireless sensor networks are increasingly being used in military, environmental, health and commercial applications. Sensor networks are inherently different from traditional wired networks as well as wireless ad-hoc networks. Security is an important feature for the deployment of Wireless Sensor
Networks. This paper summarizes the attacks and their classifications in wireless sensor networks and also an attempt has been made to explore the security mechanism widely used to handle those attacks. The challenges of
Wireless Sensor Networks are also briefly discussed. This

[17]

[18]

8

Adrian Perrig, John Stankovic, David Wagner, “Security in Wireless
Sensor Networks” Communications of the ACM, Page53-57, year
2004
Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon Hong,
“Security in Wireless Sensor Networks: Issues and Challenges”,
International conference on Advanced Computing Technologies,
Page1043-1045, year 2006
Chris Karlof, David Wagner, “Secure Routing in Wireless Sensor
Networks: Attacks and Countermeasures”, AdHoc Networks
(elsevier), Page: 299-302, year 2003
Ian F. Akykildiz, Weilian Su, Yogesh Sankarasubramaniam, and
Erdal Cayirci, “A Survey on Sensor Networks”, IEEE
Communication Magazine, year 2002
John Paul Walters, Zhengqiang Liang, Weisong Shi, Vipin
Chaudhary, “Wireless Sensor Network Security: A Survey”, Security in Distributed, Grid and Pervasive Computing Yang Xiao (Eds),
Page3-5, 10-15, year 2006
Pathan, A.S.K.; Hyung-Woo Lee; Choong Seon Hong, “Security in wireless sensor networks: issues and challenges” Advanced
Communication Technology (ICACT), Page(s):6, year 2006
Tahir Naeem, Kok-Keong Loo, Common Security Issues and
Challenges in Wireless Sensor Networks and IEEE 802.11 Wireless
Mesh Networks, International Journal of Digital Content Technology and its Applications, Page 89-90 Volume 3, Number 1, year 2009
Undercoffer, J., Avancha, S., Joshi, A. and Pinkston, J. “Security for sensor networks”. In Proceedings of the CADIP Research
Symposium, University of Maryland, Baltimore County, USA, year
2002 http://www.cs.sfu.ca/~angiez/personal/paper/sensor-ids.pdf
Zia, T.; Zomaya, A., “Security Issues in Wireless Sensor Networks”,
Systems and Networks Communications (ICSNC) Page(s):40 – 40, year 2006
Xiangqian Chen, Kia Makki, Kang Yen, and Niki Pissinou, Sensor
Network Security: A Survey, IEEE Communications Surveys &
Tutorials, vol. 11, no. 2,page(s): 52-62, year 2009
Culler, D. E and Hong, W., “Wireless Sensor Networks”,
Communication of the ACM, Vol. 47, No. 6, June 2004, pp. 30-33.
D. Djenouri, L. Khelladi, and N. Badache, “A Survey of Security
Issues in Mobile ad hoc and Sensor Networks,” IEEE Commun.
Surveys Tutorials, vol. 7, pp. 2–28, year 2005.
S. Schmidt, H. Krahn, S. Fischer, and D. Watjen, “A Security
Architecture for Mobile Wireless Sensor Networks,” in Proc. 1st
European Workshop Security Ad-Hoc Sensor Networks (ESAS), 2004.
Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security
Issues in Wireless Sensor Networks,” IEEE Commun. Surveys
Tutorials, vol. 8, pp. 2–23, year 2006.
Yun Zhou, Yuguang Fang, Yanchao Zhang, Securing Wireless Sensor
Networks: A Survey, IEEE Communications Surveys & Tutorials, year 2008
Xiuli Ren, Security Methods for Wireless Sensor Networks,
Proceedings of the 2006 IEEE International Conference on
Mechatronics and Automation , Page: 1925 ,year 2006
R. Roman, J. Zhou, and J. Lopez, “On the security of wireless sensor networks,” in International Conference on Computational Science and
Its Applications – ICCSA 2005, May 9-12 2005, vol. 3482 of Lecture
Notes in Computer Science, (Singapore), pp. 681–690, Springer
Verlag, Heidelberg, D-69121, Germany, 2005.
N. Sastry and D. Wagner, “Security considerations for ieee 802.15.4 networks,” in Proceedings of the 2004 ACM workshop on Wireless security, pp. 32–42, Philadelphia, PA, USA: ACM Press, 2004.

ISSN 1947 5500

(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 4, No. 1 & 2, 2009
[19] L.Weimin, Y.Zongkai, C.Wenqing, T.Yunmeng, Research on The
Security in Wireless Sensor Network, Asian Journal of Information
Technologys, Page(s): 339-345, year 2006
AUTHORS PROFILE
Dr. Padmavathi Ganapathi is the Professor and Head of Department of
Computer Science, Avinashilingam University for Women, Coimbatore. She has 21 years of teaching experience and one year Industrial experience. Her areas of interest include Network security and Cryptography and real time communication. She has more than 50 publications at national and
International level. She is a life member of many professional organizations like CSI, ISTE, AACE, WSEAS, ISCA, and UWA.
Mrs. Shanmugapriya. D, received the B.Sc. and M.Sc. degrees in
Computer Science from Avinashilingam University for Women, Coimbatore in 1999 and 2001 respectively. And, she received the M.Phil degree in
Computer Science from Manonmaniam Sundaranar University, Thirunelveli in 2003 and pursuing her PhD at Avinashilingam University for Women.
She is currently working as a Lecturer in Information Technology in the same University and has eight years of teaching experience. Her research interests are Biometrics, Network Security and System Security.

9

ISSN 1947 5500

Similar Documents

Premium Essay

Amazon.Com: an E-Commerce Retailer

...Services institution. The company serves individual consumers, small and middle businesses, corporations and Governments with their banking, investing, asset management and other financial products and services 1. The company is headquartered in Charlotte, North Carolina. The company has huge presence in America spanning across 40 states. It serves approximately 54 million consumers in US and its foot print covers 80 % of the population. The bank is being led by Brian Moynihan who succeeded Ken Lewis as the President and CEO effective January 1, 2010. Some of the key highlights of Bank of America are: As of 2010, it is the second largest bank holding company behind JP Morgan Chase in United States by assets which stood over US$ 2 trillion As of 2010, the company is the fifth largest company in United States by revenue which is over 111.4 billion2 The company was also the 3rd largest non-oil company in the US after Wal-Mart and General Electric In 2010, Forbes listed Bank of America as the third largest company in the world 3 The bank has over 5500 branches along with approximately 16300 ATMs and an online banking with 30 million active users 4 The major competitors of Bank of America are JP Morgan Chase, Citi Group and Wells Fargo Bank. 1 http://www.forbes.com/companies/bank-of-america/ 2010 Bank of America Annual Report 3 http://www.forbes.com/companies/bank-of-america/ 4 http://investor.bankofamerica.com/phoenix.zhtml?c=71595&p=irol -homeprofile#fbid=W6HlSIbzfcd 2 4 Bank of...

Words: 4633 - Pages: 19

Free Essay

Banking and Social Media

...Banking and social media INDEX * Introduction- pg 3-11 * The why and how of social media w.r.t banking- pg 12-24 * International and Indian Examples of social media- pg 25-28 * The grey side of social media usage- pg 29-30 * Suggestions- pg 31 * Conclusions- pg 33-34 Introduction Social media and banking do not seem to have a strong relation at the first look on the topic, but are indeed complexly related in today’s world with the continuous evolution of the banking sector and the huge impact of social media on the masses. While today many international banks are using social media as a connectivity and marketing tool with its customers, Indian banks are also not far behind. ICICI, one of India's biggest banks, already boasts a Facebook app allowing clients to view their account details, check statements and upgrade their debit card, among other activities, but still maintains a cautious attitude to social media strategy. While there is no doubt that social media is all the rage amongst retail and advertisings sectors, it is yet to make major inroads in the financial services and banking sectors. A new report from Ovum, the technology arm of market analyst firm Datamonitor reveals that a majority of banks worldwide aren’t yet ready to embrace social media. Privacy and Data Security are two of the biggest hindrances to mass-scale social media adoption in the banking sector. Moreover, many banks do not think social media gives them an edge to engage...

Words: 11522 - Pages: 47

Premium Essay

Bank of America

...Introduction: The Bank of America was formed in 1998 after the merger of California based Bank of America and the Nations Bank of North Carolina. At the end of the 20th century the bank stood as the second largest bank in the American market with close to 4500 branches operating in 21 states. Most of these branches were located in high growth markets of the south and west coast. Globally, it employed 1, 40,000 employees across 190 nations, over $8 billon in revenues, $360 billion in deposits and some $600 billon in assets. However the markets had been consolidating for sometime with the total number of banks in America having reduced to 7000 from an figure of 14000 first recorded in 1985. Intense competition characterized the market and the challenge for national banks was to be able to localize product and service offerings for their customers. Financial services had traditionally been looked upon as commodities by banks and lack of experimentation marked the sector. The sector was however slowly realizing that traditional methods of cost reduction and other control mechanisms could only take growth so far. ‘Organic Growth', a higher wallet share of existing customers was a concept of much relevance in the highly competitive market. For achieving this Bank of America had given more freedom to individual bank managers to undertake more responsibilities. Others like Washington Mutual (WAMU) had introduced new models of customer experience, benchmarking their services...

Words: 15439 - Pages: 62

Premium Essay

The Financial and Banking System of Argentina

...The Financial and Banking System of: Argentina Presented In Partial Fulfillments of the Course Requirements for FIN 4634 International Banking Prepared for: Marcos A. Kerbel Participating Adjunct Professor Department of Finance & Real Estate Florida International University Miami, Florida Prepared by: 11/30/2014 November/30/ 2014 The Financial and Banking System of: Argentina I. Table of Contents 2 II. Geography 4 III. History of the Country 6 IV. The Country's Financial System a. Historical Overview 10 b. Present Monetary Laws and Regulations 11 c. Types of Financial Institutions operating in the country 12 d. The Central Bank 12-13 e. Bank Regulation 13 f. Commercial Banks Operating in the country 15 1. Commercial 15-16 2. Savings & Mortgage Banks 17 3. Other Financial firms 17 V. Country’s Balance of Payment and Balance of Trade- Principal Sources of Exports, Imports, investments, and funds transfers, etc. 18 VI. Foreign Reserves 19 VII. Current Situation of the country's currency 20 VIII. Risk those banks in the selected country face- such Currency, Political, Regulatory, Crime, etc. 20 IX. What is the Country doing about Preventing, Detecting and Eradicating Money Laundering and Terrorist Financing? 21 X. Important Bank Failures and Scandals...

Words: 5202 - Pages: 21

Premium Essay

Application.Servers.for.E-Business

...Application Servers for E-Business Table of Contents Application Servers for E-Business - 2 Preface - 4 Chapter 1 - Introduction - 5 Chapter 2 - A Survey of Web Technologies - 22 Chapter 3 - Java - 44 Chapter 4 - CORBA - 65 Chapter 5 - Application Servers - 82 Chapter 6 - Design Issues for Enterprise Deployment of Application Servers - 114 Chapter 7 - Tying It All Together - 137 References - 160 For More Information - 163 page 1 Application Servers for E-Business Application Servers for E-Business Lisa M. Lindgren Auerbach Library of Congress Cataloging-in-Publication Data Lindgren, Lisa. Application servers for e-business / Lisa M. Lindgren. p.cm. Includes bibliographical references and index. ISBN 0-8493-0827-5 (alk. paper) 1. Electronic commerce. 2. Application software—Development. I. Title. HF5548.32 .L557 2001 658′.0553–dc21 00-050245 This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use. Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system,...

Words: 98260 - Pages: 394

Premium Essay

Marketing Channel Distribution

...Marketing Channel Strategy This page intentionally left blank Eighth Edition Marketing Channel Strategy Robert W. Palmatier University of Washington’s Foster School of Business Louis W. Stern Northwestern University’s Kellogg School of Management Adel I. El-Ansary University of North Florida’s Coggin College of Business Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Editor in Chief: Stephanie Wall Acquisitions Editor: Mark Gaffney Program Manager Team Lead: Ashley Santora Program Manager: Jennifer M. Collins Director of Marketing: Maggie Moylen Executive Marketing Manager: Anne Fahlgren Project Manager Team Lead: Judy Leale Project Manager: Thomas Benfatti Operations Specialist: Nancy Maneri Cover Designer: Suzanne Behnke Creative Director: Jayne Conte Digital Production Project Manager: Lisa Rinaldi Full Service Vendor: Integra Software Services Pvt. Ltd. Full Service Project Manager: Anandakrishnan Natarajan/Integra Software Services Printer/Binder: Courier/Westford Cover Printer: Lehigh-Phoenix Text Font: 10/12, ITC Garamond Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text (or on page xix). Copyright © 2015 Pearson Education, Inc., publishing as Prentice...

Words: 236095 - Pages: 945

Premium Essay

Merchant Banking

...Regulatory Frameworks- Relevant Provisions of Companies Act- SERA-SEBI guidelines- FEMA etc. – Relation with stock Exchanges and OTCEI UNIT II - ISSUE MANAGEMENT Role of Merchant Banking in Appraisal of projects, Designing Capital Structures and Instruments – Issue Pricing Pricing- Preparation of prospectus selection of bankers, Advertising Consultants etc. – Role of Registrars –Underwriting Arrangements. Dealing with Bankers to the Issue, Underwriters, Registrars, and Brokers. –Offer for sale – Book- Building – Green Shoe Option –E –IPO Private Placement- Bought out Deals –Placement with FIs, MFs, FIIs, etc. offShore Issues. – Issue Marketing – Advertising Strategies-NRI Marketing- Post Issue Activities. UNIT III - OTHER FEE BASED MANAGEMENT Mergers and Acquisitions – Portfolio Management Services – Credit Syndication – Credit Rating – Mutual Funds – Business Valuation. UNIT IV - FUND BASED FINANCIAL SERVICES Leasing and Hire Purchasing – Basics of Leasing and Hire Purchasing – Financial Evaluation – Tax Implication. UNIT V - OTHER FUND BASED FINANCIAL SERVICES Consumer Credit – Credit Cards- Real Estate Financing – Bills Discounting – Recent Developments in Factoring and Forfeiting – Venture Capital. REFERENCES 1. M.Y.Khan, ‗Financial Services‘ – Tata McGraw –Hill, 3 rd Edition, 2005. 2. Machiraju, ‗ Indian Financial System ‗- Vikas Publishing House, 2 nd Edition, 2002. 3. J.C.Verma, ‗ A Manual of Merchant Banking ‗, Bharath Publishing House, New Delhi, 2001. 4. K.Sriram, ‗Hand Book...

Words: 77349 - Pages: 310

Free Essay

Doing Business in Vietnam

...Doing Business in Vietnam: 2009 Country Commercial Guide for U.S. Companies INTERNATIONAL COPYRIGHT, U.S. & FOREIGN COMMERCIAL SERVICE AND U.S. DEPARTMENT OF STATE, 2008. ALL RIGHTS RESERVED OUTSIDE OF THE UNITED STATES. • • • • • • • • • • Chapter 1: Doing Business In Vietnam Chapter 2: Political and Economic Environment Chapter 3: Selling U.S. Products and Services Chapter 4: Leading Sectors for U.S. Export and Investment Chapter 5: Trade Regulations and Standards Chapter 6: Investment Climate Chapter 7: Trade and Project Financing Chapter 8: Business Travel Chapter 9: Contacts, Market Research and Trade Events Chapter 10: Guide to Our Services 3/3/2009 Return to table of contents Chapter 1: Doing Business in Vietnam • • • • Market Overview Market Challenges Market Opportunities Market Entry Strategy Market Overview Return to top • Vietnam is a true emerging market, offering ground floor and growing opportunities for U.S. exporters and investors. Vietnam’s economic growth rate has been among the highest in the world in recent years, expanding annually at 7-8.5 percent, while industrial production has been growing at around 14-15 percent per year. Vietnam’s macroeconomic challenges and the global financial crisis dampened this growth in 2008 and will continue to do so in 2009. • In response to significant macroeconomic challenges, including high inflation and a large and growing current account deficit, the...

Words: 50261 - Pages: 202

Premium Essay

Tata

...Doing Business in Vietnam: 2011 Country Commercial Guide for U.S. Companies INTERNATIONAL COPYRIGHT, U.S. & FOREIGN COMMERCIAL SERVICE AND U.S. DEPARTMENT OF STATE, 2011. ALL RIGHTS RESERVED OUTSIDE OF THE UNITED STATES. • • • • • • • • • • Chapter 1: Doing Business in Vietnam Chapter 2: Political and Economic Environment Chapter 3: Selling U.S. Products and Services Chapter 4: Leading Sectors for U.S. Export and Investment Chapter 5: Trade Regulations, Customs and Standards Chapter 6: Investment Climate Chapter 7: Trade and Project Financing Chapter 8: Business Travel Chapter 9: Contacts, Market Research and Trade Events Chapter 10: Guide to Our Services Return to table of contents Chapter 1: Doing Business in Vietnam • • • • Market Overview Market Challenges Market Opportunities Market Entry Strategy Return to top Market Overview • Vietnam is a true emerging market, offering ground floor and growing opportunities for U.S. exporters and investors. Vietnam’s economic growth rate has been among the highest in the world in recent years, expanding at an average about 7.2 percent per year during the period 2001-2010, while industrial production grew at an average of about 12 percent per year during the same period. Vietnam registered GDP growth rate of 6.7 percent in 2010 and was one of only a handful of countries around the world to experience such levels of economic growth. Moving forward, inflation remains a main risk to Vietnam’s economy, which the Government...

Words: 52699 - Pages: 211

Premium Essay

International Business Overview

...UNIT – I INTERNATIONAL BUSINESS – AN OVERVIEW Content Outline          Introduction Definition and meaning of international business Scope of international business Special difficulties in international business Benefits of international business Understanding of international business environment Framework for analyzing the international business environment Summary Review Questions INTRODUCTION One of the most dramatic and significant world trends in the past two decades has been the rapid, sustained growth of international business. Markets have become truly global for most goods, many services, and especially for financial instruments of all types. World product trade has expanded by more than 6 percent a year since 1950, which is more than 50 percent faster than growth of output the most dramatic increase in globalization, has occurred in financial markets. In the global forex markets, billions of dollars are transacted each day, of which more than 90 percent represent financial transactions unrelated to trade or investment. Much of this activity takes place in the so-called Euromarkets, markets outside the country whose currency is used. This pervasive growth in market interpenetration makes it increasingly difficult for any country to avoid substantial external impacts on its economy. In particular massive capital flows can push exchange rates away from levels that accurately reflect competitive relationships among nations...

Words: 80869 - Pages: 324

Premium Essay

Cross Cultural Management

...Cross-Cultural Communication Theory and Practice Barry Tomalin; Brian J. Hurn ISBN: 9780230391147 DOI: 10.1057/9780230391147 Palgrave Macmillan Please respect intellectual property rights This material is copyright and its use is restricted by our standard site license terms and conditions (see palgraveconnect.com/pc/connect/info/terms_conditions.html). If you plan to copy, distribute or share in any format, including, for the avoidance of doubt, posting on websites, you need the express prior permission of Palgrave Macmillan. To request permission please contact rights@palgrave.com. Cross-Cultural Communication 10.1057/9780230391147 - Cross-Cultural Communication, Brian J. Hurn and Barry Tomalin Copyright material from www.palgraveconnect.com - licensed to Griffith University - PalgraveConnect - 2014-04-12 This page intentionally left blank 10.1057/9780230391147 - Cross-Cultural Communication, Brian J. Hurn and Barry Tomalin Copyright material from www.palgraveconnect.com - licensed to Griffith University - PalgraveConnect - 2014-04-12 Cross-Cultural Communication Theory and Practice Brian J. Hurn and Barry Tomalin Copyright material from www.palgraveconnect.com - licensed to Griffith University - PalgraveConnect - 2014-04-12 10.1057/9780230391147 - Cross-Cultural Communication, Brian J. Hurn and Barry Tomalin © Brian J. Hurn and Barry Tomalin 2013 Foreword © Jack Spence 2013 All rights reserved. No reproduction, copy or transmission of this...

Words: 129836 - Pages: 520

Free Essay

Swn Jdkjkjje Jne

...Employment News 31 May - 6 June 2014 www.employmentnews.gov.in 21 UNION PUBLIC SERVICE COMMISSION EXAMINATION NOTICE NO. 09/2014-CSP (LAST DATE FOR RECEIPT OF APPLICATIONS : 30/06/2014) DATE :31.05.2014 CIVIL SERVICES EXAMINATION, 2014 (Commission’s website-http://upsc.gov.in) F. No. 1/5/2013-E.I(B) : Preliminary Examination of the Civil Services Examination for recruitment to the Services and Posts mentioned below will be held by the Union Public Service Commission on 24th Aug., 2014 in accordance with the Rules published by the Department of Personnel & Training in the Gazette of India Extraordinary dated 31st May, 2014. (i) Indian Administrative Service. (ii) Indian Foreign Service. (iii) Indian Police Service. (iv) Indian P & T Accounts & Finance Service, Group ‘A’. (v) Indian Audit and Accounts Service, Group ‘A’. (vi) Indian Revenue Service (Customs and Central Excise), Group ‘A’. (vii) Indian Defence Accounts Service, Group ‘A’. (viii) Indian Revenue Service (I.T.), Group ‘A’. (ix) Indian Ordnance Factories Service, Group ‘A’ (Assistant Works Manager, Administration). (x) Indian Postal Service, Group ‘A’. (xi) Indian Civil Accounts Service, Group ‘A’. (xii) Indian Railway Traffic Service, Group ‘A’. (xiii) Indian Railway Accounts Service, Group 'A'. (xiv) Indian Railway Personnel Service, Group ‘A’. (xv) Post of Assistant Security Commissioner in Railway Protection Force, Group ‘A’ (xvi) Indian Defence Estates Service, Group...

Words: 47693 - Pages: 191

Free Essay

Whirlpool

...Employment News 11 - 17 February 2012 www.employmentnews.gov.in 21 Union Public Service Commission EXAMINATION NOTICE NO. 04/2012-CSP DATED 11.02.2012 (LAST DATE FOR RECEIPT OF APPLICATIONS : 05.03.2012) CIVIL SERVICES EXAMINATION, 2012 (Commission's website - http://www.upsc.gov.in) F. No. 1/4/2011-E.I(B) : Preliminary Examination of the Civil Services Examination for recruitment to the Services and Posts mentioned below will be held by the Union Public Service Commission on 20th May, 2012 in accordance with the Rules published by the Department of Personnel & Training in the Gazette of India Extraordinary dated 4th February, 2012. (i) Indian Administrative Service. (ii) Indian Foreign Service. (iii) Indian Police Service. (iv) Indian P & T Accounts & Finance Service, Group ‘A’. (v) Indian Audit and Accounts Service, Group ‘A’. (vi) Indian Revenue Service (Customs and Central Excise), Group ‘A’. (vii) Indian Defence Accounts Service, Group ‘A’. (viii) Indian Revenue Service (I.T.), Group ‘A’. (ix) Indian Ordnance Factories Service, Group ‘A’ (Assistant Works Manager, Administration). (x) Indian Postal Service, Group ‘A’. (xi) Indian Civil Accounts Service, Group ‘A’. (xii) Indian Railway Traffic Service, Group ‘A’. (xiii) Indian Railway Accounts Service, Group 'A'. (xiv) Indian Railway Personnel Service, Group ‘A’. (xv) Post of Assistant Security Commissioner in Railway Protection Force, Group ‘A’ (xvi) Indian Defence Estates Service, Group ‘A’. (xvii) Indian Information...

Words: 50586 - Pages: 203

Premium Essay

Managing Cultura Differences

...MANAGING CULTURAL DIFFERENCES SIXTHEDITION MANAGING CULTURAL DIFFERENCES SERIES Managing Cultural Differences: Global Leadership Strategies for the 21 st Century, Sixth Edition Philip R. Harris, Ph.D., Robert T. Moran, Ph.D., Sarah V. Moran, M.A. Managing Cultural Diversity in Technical Professions Lionel Laroche, Ph.D Uniting North American Business—NAFTA Best Practices Jeffrey D. Abbot and Robert T. Moran, Ph.D. Eurodiversity: A Business Guide to Managing Differences George Simons, D.M. Global Strategic Planning: Cultural Perspectives for Profit and Non-Profit Organizations Marios I. Katsioulodes Ph.D. Competing Globally: Mastering Cross-Cultural Management and Negotiations Farid Elashmawi, Ph.D. Succeeding in Business in Eastern and Central Europe—A Guide to Cultures, Markets, and Practices Woodrow H. Sears, Ed.D. and Audrone Tamulionyte-Lentz, M.S. Intercultural Services: A Worldwide Buyer’s Guide and Sourcebook Gary M. Wederspahn, M.A. SIXTH EDITION MANAGING CULTURAL DIFFERENCES GLOBAL LEADERSHIP STRATEGIES ST FOR THE 21 CENTURY 25TH ANNIVERSARY EDITION PHILIP R. HARRIS, PH.D. ROBERT T. MORAN, PH.D. SARAH V. MORAN, M.A. JUDITH SOCCORSY Editorial Coordinator Elsevier Butterworth–Heinemann 200 Wheeler Road, Burlington, MA 01803, USA Linacre House, Jordan Hill, Oxford OX2 8DP, UK Copyright © 2004, Philip R. Harris, Robert T. Moran, Sarah V. Moran. All rights reserved. No part of this publication may be reproduced, stored in a...

Words: 229816 - Pages: 920

Premium Essay

Mob Griffin

...Licensed to: iChapters User Licensed to: iChapters User Organizational Behavior: Managing People and Organizations, Tenth Edition Ricky W. Griffin and Gregory Moorhead Vice President of Editorial, Business: Jack W. Calhoun Executive Editor: Scott Person Senior Developmental Editor: Julia Chase Editorial Assistant: Ruth Belanger Marketing Manager: Jonathan Monahan Senior Content Project Manager: Holly Henjum Media Editor: Rob Ellington Buyer: Arethea L. Thomas Marketing Communications Manager: Jim Overly Production Service: S4Carlisle Publishing Services Sr. Art Director: Tippy McIntosh Cover and Internal Design: Joe Devine, Red Hanger Design LLC Cover Image: © Eric Isselée, Shutterstock Rights Acquisitions Specialist/Images: John Hill © 2012, 2010 South-Western, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or product, submit all requests online...

Words: 34296 - Pages: 138