Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010192767 | TK5103.2 S44 2009 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. To achieve these aims, security mechanisms are essential to ensure trusted on-going communications.
Security in Wireless Mesh Networks explores key security challenges set in diverse scenarios, as well as emerging standards that include authentication, access control and authorization, attacks, privacy and trust, encryption, key management, identity management, DoS attacks, intrusion detection and prevention, secure routing, and security policies. The book also examines security mechanisms in IEEE 802.11, IEEE 802.15, IEEE 802.16, and IEEE 802.20 standards.nbsp; In addition, it provides numerous case studies and applications to facilitate understanding.
As a single, comprehensive guide to security-related issues in WMN, this book is an important resource to have if you are working on the design, selection, and implementation of wireless mesh networks and system components.
Author Notes
Yan Zhang, Jun Zheng, Honglin Hu
Table of Contents
Contributors | p. vii |
Part I Introduction | |
1 An Introduction to Wireless Mesh Networks | p. 3 |
2 Mesh Networking in Wireless PANs, LANs, MANs, and WANs | p. 45 |
Part II Security Protocols and Techniques | |
3 Attacks and Security Mechanisms | p. 111 |
4 Intrusion Detection in Wireless Mesh Networks | p. 145 |
5 Secure Routing in Wireless Mesh Networks | p. 171 |
6 Hop Integrity in Wireless Mesh Networks | p. 197 |
7 Privacy Preservation in Wireless Mesh Networks | p. 227 |
8 Providing Authentication, Trust, and Privacy in Wireless Mesh Networks | p. 261 |
9 Non-Interactive Key Establishment in Wireless Mesh Networks | p. 297 |
10 Key Management in Wireless Mesh Networks | p. 323 |
Part III Security Standards, Applications, and Enabling Technologies | |
11 Security in Wireless PAN Mesh Networks | p. 349 |
12 Security in Wireless LAN Mesh Networks | p. 381 |
13 Security in IEEE 802.15.4 Cluster-Based Networks | p. 409 |
14 Security in Wireless Sensor Networks | p. 433 |
15 Key Management in Wireless Sensor Networks | p. 491 |
Index | p. 517 |