Security for Multihop Wireless Networks
✍ Scribed by Shafiullah Khan, Jaime Lloret Mauri
- Publisher
- CRC Press
- Year
- 2014
- Tongue
- English
- Leaves
- 540
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.
Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer.
The text explains how to deal with black hole attacks in mobile ad hoc networks and describes how to detect misbehaving nodes in vehicular ad hoc networks. It identifies a pragmatic and energy efficient security layer for wireless sensor networks and covers the taxonomy of security protocols for wireless sensor communications.
Exploring recent trends in the research and development of multihop network security, the book outlines possible defenses against packet-dropping attacks in wireless multihop ad hoc networks.Complete with expectations for the future in related areas, this is an ideal reference for researchers, industry professionals, and academics. Its comprehensive coverage also makes it suitable for use as a textbook in graduate-level electrical engineering programs.
✦ Table of Contents
SECURITY IN MOBILE AD HOC NETWORKS
Taxonomy and Holistic Detection of Security Attacks in MANETs; P. García-Teodoro, L. Sánchez-Casado, and G. Maciá-Fernández
Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks; Mohamed Amine Ferrag, Mehdi Nafa, and Salim Ghanemi
Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks; A. S. Khan, N. Fisal, M. Esa, S. Kamilah, Suleiman Zubair, W. Maqbool, and Z. Abu Bakar
Fighting against Black Hole Attacks in Mobile Ad Hoc Networks; Manuel D. Serrat-Olmos, Enrique Hernández-Orallo, Juan-Carlos Cano, Carlos T. Calafate, and Pietro Manzoni
Mutual Authentication in IP Mobility-Enabled Multihop Wireless Networks; Sanaa Taha, Sandra Céspedes, and Xuemin (Sherman) Shen
Detection of Misbehaving Nodes in Vehicular Ad-Hoc Network; Rajesh P. Barnwal and Soumya K. Ghosh
SECURITY IN WIRELESS SENSOR NETWORKS
Security Architecture for Multihop Wireless Sensor Networks; Ismail Mansour, Gerard Chalhoub, and Michel Misson
Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach; Dauda Ayanda
TinyKey: A Pragmatic and Energy Efficient Security Layer for Wireless Sensor Networks; Roberto Doriguzzi Corin, Giovanni Russello, and Elio Salvadori
Secure Multipurpose Wireless Sensor Networks; Daniel Jacobi, Marc Fischlin, and Alejandro Buchmann
Anomaly Detection in Wireless Sensor Networks: Challenges and Future Trends; Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu, and Surraya Khanum
Taxonomy of Security Protocols for Wireless Sensor Communications; Jasone Astorga, Eduardo Jacob, Nerea Toledo, and Marivi Higuero
SECURITY IN OTHER AD-HOC NETWORKS
Securing the Control of Euler–Lagrange Systems in Networked Environments with Model-Free Sliding Mode Control; Shuai Li, Yunpeng Wang, and Long Cheng
Defenses against Packet-Dropping Attacks in Wireless Multihop Ad-Hoc Networks; L. Sánchez-Casado, R. Magán-Carrión, P. García-Teodoro, and J.E. Díaz-Verdejo
Security Issues in Machine-to-Machine Communication; Shuo Chen and Maode Ma
Authentication in Wireless Mesh Networks; Aymen Boudguiga and Maryline Laurent
Wireless-Based Application-Layer Cross-Layer Design with Simultaneous Quality of Service and Security Support; Sasan Adibi
Security, Trust, and Privacy in Opportunistic Multihop Wireless Networks; M. Bala Krishna
✦ Subjects
Связь и телекоммуникации;Мобильная связь;
📜 SIMILAR VOLUMES
<p><P>Wireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations.</P><P><STRONG>Security for Wireless Sensor Networks</STRONG> discusses fundamental security issues in wireless sensor networks, techniques for the prote
<b>This book provides an introduction to opportunistic routing an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks</b><p> This book presents a comprehensive background to the technological challenges lying
Security has always been a one of the biggest challenges for wireless local area networks (WLAN) ever since its inception. Plenty of studies have been done on the wireless network security in recent years, but they are mostly focused on the infrastructure based WLAN. The security requirements of wir
This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments.An Instructor Support