<p>Wireless networking enables two or more computers to communicate using standard network protocols without network cables. Since their emergence in the 1970s, wireless networks have become increasingly popยญ ular in the computing industry. In the past decade, wireless networks have enabled true mob
Intrusion Detection in Wireless Ad-Hoc Networks
โ Scribed by Nabendu Chaki, Rituparna Chaki
- Publisher
- CRC Press
- Year
- 2014
- Tongue
- English
- Leaves
- 259
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.
This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems.
- Addresses architecture and organization issues
- Examines the different types of routing attacks for WANs
- Explains how to ensure Quality of Service in secure routing
- Considers honesty and trust-based IDS solutions
- Explores emerging trends in WAN security
- Describes the blackhole attack detection technique
Surveying existing trust-based solutions, the book explores the potential of the CORIDS algorithm to provide trust-based solutions for secure mobile applications. Touching on more advanced topics, including security for smart power grids, securing cloud services, and energy-efficient IDSs, this book provides you with the tools to design and build secure next-generation wireless networking environments.
โฆ Table of Contents
Introduction; Novarun Deb, Manali Chakraborty, and Nabendu Chaki
Architecture and Organization Issues; Manali Chakraborty, Novarun Deb, Debdutta Barman Roy, and Rituparna Chaki
Routing for Ad- Hoc Networks; Debdutta Barman Roy and Rituparna Chaki
Different Types of Attacks for WANs; Debdutta Barman Roy and Rituparna Chaki
Honesty and Trust- Based IDS Solutions; Novarun Deb, Manali Chakraborty, and Nabendu Chaki
Blackhole Attack Detection Technique; Debdutta Barman Roy and Rituparna Chaki
Intrusion Detection for Wireless Mesh Networks; Novarun Deb, Manali Chakraborty, and Nabendu Chaki
Future Trends in WAN Security; Tapalina Bhattasali, Manali Chakraborty, and Nabendu Chaki
๐ SIMILAR VOLUMES
The book I order was 'new', wrapped in plastic cover. It was delivered in less than one week with UPS and in great condition. I am very pleased with it.
<p><P>Wireless ad hoc networks, mobile or static, have special resource requirements and topology features, which make them different from classic computer networks in resource management, routing, media access control, and QoS provisioning. Some of our day-to-day situations directly relate to ad ho
<P>Wireless ad-hoc network communication technologies have experienced a steep growth in research and significant advancements in recent times due to their important advantages. These benefits help to set-up a network fast in situations where there is no existing network set-up, or when setting up a