Skip to:Content
|
Bottom
Cover image for Security and quality of service in ad hoc wireless networks
Title:
Security and quality of service in ad hoc wireless networks
Personal Author:
Publication Information:
Cambridge, UK : Cambridge University Press, 2008
ISBN:
9780521878241

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010160388 TK5105.77 M57 2008 Open Access Book Book
Searching...

On Order

Summary

Summary

Ensuring secure transmission and good quality of service (QoS) in ad hoc wireless networks are key commercial concerns. Focusing on practical potential solutions, this text covers security and QoS in these networks. Starting with a review of the basic principles of ad hoc wireless networking, coverage progresses to vulnerabilities, and the requirements and solutions necessary to tackle them. QoS in relation to ad hoc networks is covered in detail, with specific attention to routing, QoS support in unicast communication, and recent developments in the area. Secure routing, intrusion detection, security in WiMax networks and trust management are also covered, the latter being based on principles and practice of key management and authentication in distributed networks. Representing the state-of-the-art in ad hoc wireless network security, this book is a valuable resource for researchers in electrical and computer engineering, as well as practitioners in the wireless communications industry.


Table of Contents

Prefacep. xi
Acknowledgementsp. xiii
1 Introductionp. 1
1.1 Ad hoc networkingp. 1
1.2 The ad hoc wireless network: operating principlesp. 3
1.3 Ad hoc networks: vulnerabilitiesp. 8
1.4 Ad hoc networks: security requirementsp. 11
1.5 Quality of servicep. 14
1.6 Further readingp. 15
1.7 Referencesp. 15
2 Wireless securityp. 17
2.1 Wireless local area networks (IEEE 802.11) securityp. 17
2.2 Wireless cellular network securityp. 29
2.3 Bluetooth or IEEE 802.15 securityp. 40
2.4 Summary and further readingp. 41
2.5 Referencesp. 42
3 Threats and attacksp. 43
3.1 Attack classificationp. 43
3.2 Denial of service (DoS)p. 44
3.3 Impersonationp. 45
3.4 Disclosurep. 48
3.5 Attacks on information in transitp. 49
3.6 Attacks against routing or network layerp. 49
3.7 Node hijackingp. 52
3.8 Further readingp. 59
3.9 Referencesp. 59
4 Trust managementp. 61
4.1 The resurrecting ducklingp. 61
4.2 Key managementp. 62
4.3 Authenticationp. 76
4.4 Further readingp. 79
4.5 Referencesp. 80
5 Intrusion detectionp. 82
5.1 Introductionp. 82
5.2 Security vulnerabilities in mobile ad hoc networks (MANETs)p. 84
5.3 Intrusion detection systems: a brief overviewp. 86
5.4 Requirements for an intrusion detection system for mobile ad hoc networksp. 88
5.5 Intrusion detection in MANETsp. 89
5.6 Mobile agents for intrusion detection and response in MANETsp. 96
5.7 Summaryp. 102
5.8 Further readingp. 105
5.9 Referencesp. 106
6 Quality of servicep. 107
6.1 Introductionp. 107
6.2 Routing in mobile ad hoc networksp. 110
6.3 Routing with quality of service constraintsp. 112
6.4 Quality of service routing in ad hoc networksp. 118
6.5 Conclusion and further readingp. 126
6.6 Referencesp. 127
7 Secure routingp. 129
7.1 Security aware routingp. 129
7.2 Secure distance-vector routing protocolsp. 133
7.3 Mitigating routing misbehaviorp. 136
7.4 Secure packet forwarding - the currency conceptp. 137
7.5 Secure route discovery (SRP) and secure message transmission (SMT) protocolsp. 141
7.6 Summary of security features in routing protocols and further readingp. 145
7.7 Referencesp. 146
8 Security in WiMax networksp. 147
8.1 Introductionp. 147
8.2 Standardization and certificationp. 148
8.3 Frame structurep. 151
8.4 Point-to-multipoint (PMP) modep. 153
8.5 Meshp. 155
8.6 Quality of servicep. 156
8.7 Security features in WiMaxp. 157
8.8 Open issuesp. 169
8.9 Summary and further readingp. 171
8.10 Referencesp. 171
Glossaryp. 172
Indexp. 176
Go to:Top of Page