Skip to:Content
|
Bottom
Cover image for Security in wireless mesh networks
Title:
Security in wireless mesh networks
Series:
Wireless networks and mobile communications
Publication Information:
Boca Raton, FL : CRC, 2009
Physical Description:
ix, 536 p. : ill. ; 24 cm.
ISBN:
9780849382505
General Note:
An Auerbach book

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010192767 TK5103.2 S44 2009 Open Access Book Book
Searching...

On Order

Summary

Summary

Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. To achieve these aims, security mechanisms are essential to ensure trusted on-going communications.

Security in Wireless Mesh Networks explores key security challenges set in diverse scenarios, as well as emerging standards that include authentication, access control and authorization, attacks, privacy and trust, encryption, key management, identity management, DoS attacks, intrusion detection and prevention, secure routing, and security policies. The book also examines security mechanisms in IEEE 802.11, IEEE 802.15, IEEE 802.16, and IEEE 802.20 standards.nbsp; In addition, it provides numerous case studies and applications to facilitate understanding.

As a single, comprehensive guide to security-related issues in WMN, this book is an important resource to have if you are working on the design, selection, and implementation of wireless mesh networks and system components.


Author Notes

Yan Zhang, Jun Zheng, Honglin Hu


Table of Contents

A. Antony Franklin and C. Siva Ram MurthyNeila Krichene and Noureddine BoudrigaAnjum Naveed and Salil S. Kanhere and Sanjay K. JhaThomas M. Chen and Geng-Sheng Kuo and Zheng-Ping Li and Guo-Mei ZhuManel Guerrero ZapataChin-Tser HuangTaojun Wu and Yuan Xue and Yi CuiHassnaa MoustafaZhenjiang Li and J.J. Garcia-Luna-AcevesManel Guerrero ZapataStefaan Seys and Dave Singelee and Bart PreneelNancy-Cam Winget and Shah RahmanMoazzam Khan and Jelena MisicYong Wang and Garhan Attebury and Byrav RamamurthyFalko Dressler
Contributorsp. vii
Part I Introduction
1 An Introduction to Wireless Mesh Networksp. 3
2 Mesh Networking in Wireless PANs, LANs, MANs, and WANsp. 45
Part II Security Protocols and Techniques
3 Attacks and Security Mechanismsp. 111
4 Intrusion Detection in Wireless Mesh Networksp. 145
5 Secure Routing in Wireless Mesh Networksp. 171
6 Hop Integrity in Wireless Mesh Networksp. 197
7 Privacy Preservation in Wireless Mesh Networksp. 227
8 Providing Authentication, Trust, and Privacy in Wireless Mesh Networksp. 261
9 Non-Interactive Key Establishment in Wireless Mesh Networksp. 297
10 Key Management in Wireless Mesh Networksp. 323
Part III Security Standards, Applications, and Enabling Technologies
11 Security in Wireless PAN Mesh Networksp. 349
12 Security in Wireless LAN Mesh Networksp. 381
13 Security in IEEE 802.15.4 Cluster-Based Networksp. 409
14 Security in Wireless Sensor Networksp. 433
15 Key Management in Wireless Sensor Networksp. 491
Indexp. 517
Go to:Top of Page