Skip to:Content
|
Bottom
Cover image for Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing
Title:
Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing
Personal Author:
Publication Information:
Cambridge, UK : Cambridge University Press, 2008
ISBN:
9780521873710
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010160389 TK5102.85 B87 2008 Open Access Book Book
Searching...

On Order

Summary

Summary

This is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their implications explained in terms of security and cooperation, and potential malicious and selfish misdeeds are described along with the existing and future security techniques. Fundamental questions of security including user and device identification; establishment of security association; secure and cooperative routing in multi-hop networks; fair bandwidth distribution; and privacy protection are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor, and RFID networks. Important relationships between trust, security, and cooperation are also discussed. Contains homework problems and tutorials on cryptography and game theory. This text is suitable for advanced undergraduates and graduate students of electrical engineering and computer science, and researchers and practitioners in the wireless industry. Lecture slides and instructor-only solutions available online (www.cambridge.org/9780521873710).


Reviews 1

Choice Review

Computer users are quite familiar with computer viruses, spam e-mail, phishing attacks, and denial-of-service attacks that plague the wired Internet. Today the number of wireless devices in the world (e.g., cell phones, wireless LANs) exceeds the number of wired ones. Such networks exhibit several security weaknesses which create even more formidable challenges. Buttyan (Budapest Univ. of Technology and Economics) and Hubaux (Ecole Polytechnique Federale de Lausanne) analyze security and noncooperative behavior in this three-part work. Part 1 gives an introduction and background describing how wireless networks such as personal communication, vehicular, sensor, and RFID networks are secured. Part 2 discusses malicious behavior such as accessing unauthorized information or deliberately affecting the availability of the network to other users. Part 3 describes selfish behavior where a greedy user hogs shared radio-frequency spectrum at the expense of other users. Some of the specific topics addressed include cheating with identities, illegitimate access to confidential data, attacks against privacy, hogging bandwidth, and techniques to prevent malicious and selfish behavior. The authors offer both theoretical analysis and real-world examples. Homework problems are provided at the end of each chapter, making the work suitable for classroom adoption. Includes more than 400 references. Summing Up: Recommended. Upper-division undergraduate through research/faculty electrical engineering, computer engineering, or computer science collections. F. A. Cassara Polytechnic University


Table of Contents

Prefacep. xi
Acknowledgementsp. xvi
Part I Introductionp. 1
1 The security of existing wireless networksp. 3
1.1 Vulnerabilities of wireless networksp. 4
1.2 Security requirementsp. 6
1.3 How existing wireless networks are securedp. 7
1.4 Summaryp. 31
1.5 To probe furtherp. 31
1.6 Questionsp. 32
2 Upcoming wireless networks and new challengesp. 33
2.1 Introductionp. 33
2.2 Upcoming wireless networksp. 34
2.3 Trends and security challenges in wireless networksp. 68
2.4 Summaryp. 69
2.5 To probe furtherp. 69
2.6 Questionsp. 72
3 Trust assumptions and adversary modelsp. 74
3.1 About trustp. 74
3.2 Trust in the era of ubiquitous computingp. 76
3.3 Adversaryp. 77
3.4 Summaryp. 80
3.5 To probe furtherp. 80
3.6 Questionsp. 81
Part II Thwarting malicious behaviorp. 83
4 Naming and addressingp. 85
4.1 The future of naming and addressing in the Internetp. 85
4.2 Attacks against naming and addressingp. 91
4.3 Protection techniquesp. 94
4.4 Summaryp. 101
4.5 To probe furtherp. 101
4.6 Questionsp. 102
5 Establishment of security associationsp. 103
5.1 Key establishment in sensor networksp. 104
5.2 Exploiting physical contactp. 117
5.3 Exploiting mobilityp. 118
5.4 Exploiting the properties of vicinity and of the radio linkp. 128
5.5 Revocationp. 134
5.6 Summaryp. 136
5.7 To probe furtherp. 137
5.8 Questionsp. 140
6 Securing neighbor discoveryp. 141
6.1 The wormhole attackp. 142
6.2 Wormhole detection mechanismsp. 146
6.3 Summaryp. 167
6.4 To probe furtherp. 167
6.5 Questionsp. 168
7 Secure routing in multi-hop wireless networksp. 169
7.1 Routing protocols for mobile ad hoc networksp. 169
7.2 Attacks on ad hoc network routing protocolsp. 182
7.3 Securing ad hoc network routing protocolsp. 191
7.4 Provable security for ad hoc network routing protocolsp. 217
7.5 Secure routing in sensor networksp. 226
7.6 Summaryp. 234
7.7 To probe furtherp. 235
7.8 Questionsp. 236
8 Privacy protectionp. 237
8.1 Important privacy related notions and metricsp. 240
8.2 Privacy in RFID systemsp. 243
8.3 Location privacy in vehicular networksp. 254
8.4 Privacy preserving routing in ad hoc networksp. 260
8.5 Summaryp. 267
8.6 To probe furtherp. 268
8.7 Questionsp. 270
Part III Thwarting selfish behaviorp. 273
9 Selfish behavior at the MAC layer of CSMA/CAp. 275
9.1 Operating principles of IEEE 802.11p. 276
9.2 Detecting selfish behavior in hotspotsp. 280
9.3 Selfish behavior in pure ad hoc networksp. 301
9.4 Summaryp. 327
9.5 To probe furtherp. 328
9.6 Questionsp. 329
10 Selfishness in packet forwardingp. 331
10.1 Game theoretic model of packet forwardingp. 332
10.2 Meta-modelp. 335
10.3 Analytical resultsp. 338
10.4 Simulation resultsp. 343
10.5 Summaryp. 347
10.6 To probe furtherp. 348
10.7 Questionsp. 348
11 Wireless operators in a shared spectrump. 350
11.1 Multi-domain sensor networksp. 350
11.2 Border games in cellular operatorsp. 361
11.3 Summaryp. 376
11.4 To probe furtherp. 376
11.5 Questionsp. 377
12 Secure protocols for behavior enforcementp. 379
12.1 System modelp. 379
12.2 Cooperation-optimal protocolp. 381
12.3 Protocol for the routing stagep. 383
12.4 Protocol for packet forwardingp. 387
12.5 Discussionp. 389
12.6 Summaryp. 390
12.7 To probe furtherp. 390
12.8 Questionsp. 391
Appendix A Introduction to cryptographic algorithms and protocolsp. 393
A1 Introductionp. 393
A2 Encryptionp. 394
A3 Hash functionsp. 407
A4 Message authentication codesp. 409
A5 Digital signaturesp. 411
A6 Session key establishment protocolsp. 412
A7 Pseudo-random number generatorsp. 417
A8 Advanced authentication techniquesp. 418
A9 To probe furtherp. 422
A10 Questionsp. 422
Appendix B A tutorial on game theory for wireless networksp. 423
B1 Introductionp. 423
B2 Static gamesp. 427
B3 Dynamic gamesp. 437
B4 Repeated gamesp. 444
B5 Discussionp. 451
B6 Summaryp. 454
B7 To probe furtherp. 454
B8 Questionsp. 455
Referencesp. 458
Indexp. 479
Go to:Top of Page