Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010160388 | TK5105.77 M57 2008 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Ensuring secure transmission and good quality of service (QoS) in ad hoc wireless networks are key commercial concerns. Focusing on practical potential solutions, this text covers security and QoS in these networks. Starting with a review of the basic principles of ad hoc wireless networking, coverage progresses to vulnerabilities, and the requirements and solutions necessary to tackle them. QoS in relation to ad hoc networks is covered in detail, with specific attention to routing, QoS support in unicast communication, and recent developments in the area. Secure routing, intrusion detection, security in WiMax networks and trust management are also covered, the latter being based on principles and practice of key management and authentication in distributed networks. Representing the state-of-the-art in ad hoc wireless network security, this book is a valuable resource for researchers in electrical and computer engineering, as well as practitioners in the wireless communications industry.
Table of Contents
Preface | p. xi |
Acknowledgements | p. xiii |
1 Introduction | p. 1 |
1.1 Ad hoc networking | p. 1 |
1.2 The ad hoc wireless network: operating principles | p. 3 |
1.3 Ad hoc networks: vulnerabilities | p. 8 |
1.4 Ad hoc networks: security requirements | p. 11 |
1.5 Quality of service | p. 14 |
1.6 Further reading | p. 15 |
1.7 References | p. 15 |
2 Wireless security | p. 17 |
2.1 Wireless local area networks (IEEE 802.11) security | p. 17 |
2.2 Wireless cellular network security | p. 29 |
2.3 Bluetooth or IEEE 802.15 security | p. 40 |
2.4 Summary and further reading | p. 41 |
2.5 References | p. 42 |
3 Threats and attacks | p. 43 |
3.1 Attack classification | p. 43 |
3.2 Denial of service (DoS) | p. 44 |
3.3 Impersonation | p. 45 |
3.4 Disclosure | p. 48 |
3.5 Attacks on information in transit | p. 49 |
3.6 Attacks against routing or network layer | p. 49 |
3.7 Node hijacking | p. 52 |
3.8 Further reading | p. 59 |
3.9 References | p. 59 |
4 Trust management | p. 61 |
4.1 The resurrecting duckling | p. 61 |
4.2 Key management | p. 62 |
4.3 Authentication | p. 76 |
4.4 Further reading | p. 79 |
4.5 References | p. 80 |
5 Intrusion detection | p. 82 |
5.1 Introduction | p. 82 |
5.2 Security vulnerabilities in mobile ad hoc networks (MANETs) | p. 84 |
5.3 Intrusion detection systems: a brief overview | p. 86 |
5.4 Requirements for an intrusion detection system for mobile ad hoc networks | p. 88 |
5.5 Intrusion detection in MANETs | p. 89 |
5.6 Mobile agents for intrusion detection and response in MANETs | p. 96 |
5.7 Summary | p. 102 |
5.8 Further reading | p. 105 |
5.9 References | p. 106 |
6 Quality of service | p. 107 |
6.1 Introduction | p. 107 |
6.2 Routing in mobile ad hoc networks | p. 110 |
6.3 Routing with quality of service constraints | p. 112 |
6.4 Quality of service routing in ad hoc networks | p. 118 |
6.5 Conclusion and further reading | p. 126 |
6.6 References | p. 127 |
7 Secure routing | p. 129 |
7.1 Security aware routing | p. 129 |
7.2 Secure distance-vector routing protocols | p. 133 |
7.3 Mitigating routing misbehavior | p. 136 |
7.4 Secure packet forwarding - the currency concept | p. 137 |
7.5 Secure route discovery (SRP) and secure message transmission (SMT) protocols | p. 141 |
7.6 Summary of security features in routing protocols and further reading | p. 145 |
7.7 References | p. 146 |
8 Security in WiMax networks | p. 147 |
8.1 Introduction | p. 147 |
8.2 Standardization and certification | p. 148 |
8.3 Frame structure | p. 151 |
8.4 Point-to-multipoint (PMP) mode | p. 153 |
8.5 Mesh | p. 155 |
8.6 Quality of service | p. 156 |
8.7 Security features in WiMax | p. 157 |
8.8 Open issues | p. 169 |
8.9 Summary and further reading | p. 171 |
8.10 References | p. 171 |
Glossary | p. 172 |
Index | p. 176 |