Skip to:Content
|
Bottom
Cover image for Security for multihop wireless networks
Title:
Security for multihop wireless networks
Publication Information:
Boca Raton : CRC Press, Taylor & Francis Group, 2014
Physical Description:
xiv, 524 pages : illustrations ; 24 cm.
ISBN:
9781466578036
Abstract:
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010338264 TK5103.2 S434 2014 Open Access Book Book
Searching...

On Order

Summary

Summary

Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.

Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer.

The text explains how to deal with black hole attacks in mobile ad hoc networks and describes how to detect misbehaving nodes in vehicular ad hoc networks. It identifies a pragmatic and energy efficient security layer for wireless sensor networks and covers the taxonomy of security protocols for wireless sensor communications.

Exploring recent trends in the research and development of multihop network security, the book outlines possible defenses against packet-dropping attacks in wireless multihop ad hoc networks.Complete with expectations for the future in related areas, thisnbsp;is an ideal referencenbsp;for researchers, industry professionals, and academics. Its comprehensive coverage also makes it suitable for use as a textbook in graduate-level electrical engineering programs.


Table of Contents

P. Garcia-Teodoro and L. Sanchez-Casado and G. Macia-FernandezMohamed Amine Ferrag and Mehdi Nafa and Salim GhanemiA. S. Khan and N. Fisal and M. Esa and S. Kamilah and Suleiman Zubair and W. Maqbool and Z. Abu BakarManuel D. Serrat-Olmos and Enrique Hernández-Orallo and Juan-Carlos Cano and Carlos T. Calafate and Pietro ManzoniSanaa Taha and Sandra Cespedes and Xuemin (Sherman) ShenRajesh P. Barnwal and Soumya K. GhoshIsmail Mansour and Gerard Chalhoub and Michel MissonDauda AyandaRoberto Doriguzzi Corin and Giovanni Russello and Elio SalvadoriDaniel Jacobi and Marc Fischlin and Alejandro BuchmannMuhammad Usman and Vallipuram Muthukkumarasamy and Xin-Wen Wu and Surraya KhanumJasone Astorga and Eduardo Jacob and Nerea Toledo and Marjvi HigueroShuai Li and Yunpeng Wang and Long ChengL. Sánchez-Casado and R. Magán-Carrion and P. García-Teodoro and J.E. Díaz-VerdejoShuo Chen and Maode MaAymen Boudguiga and Maryline LaurentSasan AdibiM. Bala Krishna
Prefacep. ix
Contributorsp. xi
Section I Security in Mobile Ad Hoc Networks
1 Taxonomy and Holistic Detection of Security Attacks in MANETsp. 3
2 Security and Privacy for Routing Protocols in Mobile Ad Hoc Networksp. 19
3 Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networksp. 43
4 Fighting against Black Hole Attacks in Mobile Ad Hoc Networksp. 73
5 Mutual Authentication in IP Mobility-Enabled Multihop Wireless Networksp. 101
6 Detection of Misbehaving Nodes in Vehicular Ad Hoc Networkp. 125
Section II Security in Wireless Sensor Networks
7 Security Architecture for Multihop Wireless Sensor Networksp. 157
8 Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approachp. 179
9 TinyKey: A Pragmatic and Energy Efficient Security Layer for Wireless Sensor Networksp. 223
10 Secure Multipurpose Wireless Sensor Networksp. 247
11 Anomaly Detection in Wireless Sensor Networks: Challenges and Future Trendsp. 273
12 Taxonomy of Security Protocols for Wireless Sensor Communicationsp. 305
Section III Security in Other Ad Hoc Networks
13 Securing the Control of Euler-Lagrange Systems in Networked Environments with Model-Free Sliding Mode Controlp. 353
14 Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc Networksp. 377
15 Security Issues in Machine-to-Machine Communicationp. 401
16 Authentication in Wireless Mesh Networksp. 419
17 Wireless-Based Application-Layer Cross-Layer Design with Simultaneous Quality of Service and Security Supportp. 447
18 Security, Trust, and Privacy in Opportunistic Multihop Wireless Networksp. 477
Indexp. 503
Go to:Top of Page