๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Security for Multi-hop Wireless Networks

โœ Scribed by Mohamed M. E. A. Mahmoud, Xuemin (Sherman) Shen (auth.)


Publisher
Springer International Publishing
Year
2014
Tongue
English
Leaves
110
Series
SpringerBriefs in Computer Science
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security for Multi-hop Wireless Networks demonstrates recent research that enhances the efficiency and safety of these key networks. Concise and practical, it is a useful tool for researchers and professionals working in network security. It is also a valuable resource for advanced-level students interested in wireless communications and networking.

โœฆ Table of Contents


Front Matter....Pages i-xiii
Introduction....Pages 1-9
System Model....Pages 11-14
Efficient Incentive Scheme....Pages 15-61
Secure Routing Protocols....Pages 63-93
Conclusions and Future Directions....Pages 95-99

โœฆ Subjects


Computer Communication Networks; Communications Engineering, Networks


๐Ÿ“œ SIMILAR VOLUMES


Routing for Wireless Multi-Hop Networks
โœ Sherin Abdel Hamid, Hossam S. Hassanein, Glen Takahara (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Springer-Verlag New York ๐ŸŒ English

<p>The focus of this brief is to identify what unifies and what distinguishes the routing functions in four wireless multi-hop network paradigms. The brief introduces a generic routing model that can be used as a foundation of wireless multi-hop routing protocol analysis and design. It demonstrates

Routing for Wireless Multi-Hop Networks
โœ Sherin Abdel Hamid, Hossam S. Hassanein, Glen Takahara (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Springer-Verlag New York ๐ŸŒ English

<p>The focus of this brief is to identify what unifies and what distinguishes the routing functions in four wireless multi-hop network paradigms. The brief introduces a generic routing model that can be used as a foundation of wireless multi-hop routing protocol analysis and design. It demonstrates

Security for Wireless Ad Hoc Networks
โœ Farooq Anjum, Petros Mouchtaris ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› Wiley-Interscience ๐ŸŒ English

Security has always been a one of the biggest challenges for wireless local area networks (WLAN) ever since its inception. Plenty of studies have been done on the wireless network security in recent years, but they are mostly focused on the infrastructure based WLAN. The security requirements of wir

Security for wireless ad hoc networks
โœ Farooq Anjum, Petros Mouchtaris ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› Wiley-Interscience ๐ŸŒ English

This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments.An Instructor Support

Security for Wireless Ad Hoc Networks
โœ Farooq Anjum, Petros Mouchtaris ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› Wiley-Interscience ๐ŸŒ English

This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments.<br>An Instructor Sup