Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, l
Secure Broadcast Communication: In Wired and Wireless Networks
β Scribed by Adrian Perrig, J. D. Tygar (auth.)
- Publisher
- Springer US
- Year
- 2003
- Tongue
- English
- Leaves
- 221
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:
*key distribution for access control,
*source authentication of transmissions, and
*non-repudiation of streams.
This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.
This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.
β¦ Table of Contents
Front Matter....Pages i-xix
Introduction....Pages 1-17
Cryptographic Fundamentals....Pages 19-27
TESLA Broadcast Authentication....Pages 29-53
BiBa Broadcast Authentication....Pages 55-83
EMSS, MESS, & HTSS: Signatures for Broadcast....Pages 85-110
ELK Key Distribution....Pages 111-148
Sensor Network Security....Pages 149-173
Related Work....Pages 175-183
Conclusion....Pages 185-188
Glossary....Pages 189-192
Back Matter....Pages 193-212
β¦ Subjects
Theory of Computation; Computer Communication Networks; Data Structures, Cryptology and Information Theory; The Computing Profession; Electrical Engineering
π SIMILAR VOLUMES
<P>In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing. As
<p><b>Receive comprehensive instruction on the fundamentals of wireless security from three leading international voices in the fieldΒ </b>Β </p> <p><i>Security in Wireless Communication Networks</i>Β deliversΒ a thorough grounding in wireless communication security. The distinguished authors pay partic