<p>The focus of this brief is to identify what unifies and what distinguishes the routing functions in four wireless multi-hop network paradigms. The brief introduces a generic routing model that can be used as a foundation of wireless multi-hop routing protocol analysis and design. It demonstrates
Security for Multi-hop Wireless Networks
โ Scribed by Mohamed M. E. A. Mahmoud, Xuemin (Sherman) Shen (auth.)
- Publisher
- Springer International Publishing
- Year
- 2014
- Tongue
- English
- Leaves
- 110
- Series
- SpringerBriefs in Computer Science
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security for Multi-hop Wireless Networks demonstrates recent research that enhances the efficiency and safety of these key networks. Concise and practical, it is a useful tool for researchers and professionals working in network security. It is also a valuable resource for advanced-level students interested in wireless communications and networking.
โฆ Table of Contents
Front Matter....Pages i-xiii
Introduction....Pages 1-9
System Model....Pages 11-14
Efficient Incentive Scheme....Pages 15-61
Secure Routing Protocols....Pages 63-93
Conclusions and Future Directions....Pages 95-99
โฆ Subjects
Computer Communication Networks; Communications Engineering, Networks
๐ SIMILAR VOLUMES
<p>The focus of this brief is to identify what unifies and what distinguishes the routing functions in four wireless multi-hop network paradigms. The brief introduces a generic routing model that can be used as a foundation of wireless multi-hop routing protocol analysis and design. It demonstrates
Security has always been a one of the biggest challenges for wireless local area networks (WLAN) ever since its inception. Plenty of studies have been done on the wireless network security in recent years, but they are mostly focused on the infrastructure based WLAN. The security requirements of wir
This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments.An Instructor Support
This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments.<br>An Instructor Sup