๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Intrusion Detection in Wireless Ad-Hoc Networks

โœ Scribed by Nabendu Chaki, Rituparna Chaki


Publisher
CRC Press
Year
2014
Tongue
English
Leaves
259
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.

This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems.

  • Addresses architecture and organization issues
  • Examines the different types of routing attacks for WANs
  • Explains how to ensure Quality of Service in secure routing
  • Considers honesty and trust-based IDS solutions
  • Explores emerging trends in WAN security
  • Describes the blackhole attack detection technique

Surveying existing trust-based solutions, the book explores the potential of the CORIDS algorithm to provide trust-based solutions for secure mobile applications. Touching on more advanced topics, including security for smart power grids, securing cloud services, and energy-efficient IDSs, this book provides you with the tools to design and build secure next-generation wireless networking environments.

โœฆ Table of Contents


Introduction; Novarun Deb, Manali Chakraborty, and Nabendu Chaki
Architecture and Organization Issues; Manali Chakraborty, Novarun Deb, Debdutta Barman Roy, and Rituparna Chaki
Routing for Ad- Hoc Networks; Debdutta Barman Roy and Rituparna Chaki
Different Types of Attacks for WANs; Debdutta Barman Roy and Rituparna Chaki
Honesty and Trust- Based IDS Solutions; Novarun Deb, Manali Chakraborty, and Nabendu Chaki
Blackhole Attack Detection Technique; Debdutta Barman Roy and Rituparna Chaki
Intrusion Detection for Wireless Mesh Networks; Novarun Deb, Manali Chakraborty, and Nabendu Chaki
Future Trends in WAN Security; Tapalina Bhattasali, Manali Chakraborty, and Nabendu Chaki


๐Ÿ“œ SIMILAR VOLUMES


Ad Hoc Wireless Networking
โœ Javed Aslam, Qun Li, Daniela Rus (auth.), Xiuzhen Cheng, Xiao Huang, Ding-Zhu Du ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐Ÿ› Springer US ๐ŸŒ English

<p>Wireless networking enables two or more computers to communicate using standard network protocols without network cables. Since their emergence in the 1970s, wireless networks have become increasingly popยญ ular in the computing industry. In the past decade, wireless networks have enabled true mob

Security in Wireless Ad Hoc and Sensor N
โœ Erdal Cayirci, Chunming Rong ๐Ÿ“‚ Library ๐Ÿ“… 2009 ๐Ÿ› Wiley ๐ŸŒ English

The book I order was 'new', wrapped in plastic cover. It was delivered in less than one week with UPS and in great condition. I am very pleased with it.

Advances in Wireless Ad Hoc and Sensor N
โœ Deying Li, Maggie Xiaoyan Cheng (eds.) ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Springer US ๐ŸŒ English

<p><P>Wireless ad hoc networks, mobile or static, have special resource requirements and topology features, which make them different from classic computer networks in resource management, routing, media access control, and QoS provisioning. Some of our day-to-day situations directly relate to ad ho

Guide to Wireless Ad Hoc Networks
โœ Sudip Misra, Isaac Woungang, Subhas Chandra Misra ๐Ÿ“‚ Library ๐Ÿ“… 2009 ๐Ÿ› Springer ๐ŸŒ English

<P>Wireless ad-hoc network communication technologies have experienced a steep growth in research and significant advancements in recent times due to their important advantages. These benefits help to set-up a network fast in situations where there is no existing network set-up, or when setting up a