Wireless Network SecurityYang Xiao, Xuemin Shen, Ding-Zhu Du Springer Science & Business Media, 2007. gada 29. dec. - 424 lappuses This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking. |
No grāmatas satura
1.–5. rezultāts no 19.
85. lappuse
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
122. lappuse
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
295. lappuse
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
296. lappuse
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
297. lappuse
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
Saturs
An Adaptive Encryption Protocol in Mobile Computing | 43 |
PreAuthentication and Authentication Models | 64 |
Promoting IdentityBased Key Management | 83 |
A Survey of Attacks and Countermeasures | 103 |
Giruka and Mukesh Singhal | 138 |
A Survey on Intrusion Detection | 159 |
Intrusion Detection in Cellular Mobile Networks 183 | 182 |
The Spread of Epidemics on Smartphones | 211 |
Security in Wireless LANs | 243 |
AAA Architecture and Authentication | 273 |
An Experimental Study on Security Protocols in WLANs | 295 |
Security Issues in Wireless Sensor Networks | 324 |
Key Management Schemes in Sensor Networks | 341 |
Secure Routing in Ad Hoc and Sensor Networks | 381 |
About the Editors | 403 |
Citi izdevumi - Skatīt visu
Wireless Network Security Yang Xiao,Xuemin (Sherman) Shen,Ding-Zhu Du Priekšskatījums nav pieejams - 2007 |
Bieži izmantoti vārdi un frāzes
activities ad hoc networks adaptation addition agent algorithm applications approach architecture associated assume attacks authentication broadcast certificate chapter client communication compromised Computer connection considered cost cryptographic curve destination devices discovery discussed distributed domain effect efficient encryption epidemic establishment example exchange existing field Figure forwarding function given hash hoc networks identify identity IEEE implemented increase initialization integrity Internet intrusion detection issue layer malicious MANET mechanism method mobile multiplication neighbors node normal operations overhead packet path peers performance phase polynomial prevent probability Proc proposed random receives request routing protocols scenarios scheme secret security policies selected sends sensor networks sequence server shared signature smartphones spread station Table techniques traffic update verify weight wireless
Populāri fragmenti
134. lappuse - Giuli, K. Lai and M. Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks.
179. lappuse - J. Broch, DB Johnson, and DA Maltz. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks.
134. lappuse - In Proceedings of the sixth annual international conference on Mobile computing and networking (Mobicom '00), pages 56-67, Nov2003. 18. B. KarpandH. T. Kung. GPSR: Greedy perimeter stateless routing for wireless networks.
211. lappuse - Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Email: {zhangfan, chanson} @cs.ust.hk Abstract Multimedia applications over the Internet are becoming increasingly popular.
157. lappuse - Mobile Ad Hoc Networks. In Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'02) (2002) 206-216 11.
229. lappuse - C is much larger than that of a random graph with the same number of vertices and average number of edges per vertex.
321. lappuse - N. Borisov, I. Goldberg, and D. Wagner, "Intercepting Mobile Communications: The Insecurity of 802.11", proceedings of the Seventh Annual International Conference on Mobile Computing and Networking, 2001.
380. lappuse - C. Karlof, N. Sastry, and D. Wagner. Tinysec: A link layer security architecture for wireless sensor networks.
81. lappuse - D. Balfanz, DK Smetters, P. Stewart, and H. Chi Wong, Talking to Strangers: Authentication in AdHoc Wireless Networks, Proceedings of Network and Distributed System Security Symposium 2002 (NDSS '02), 2002.
250. lappuse - The formula X is fresh, that is, X has not been sent in a message at any time before the current run of the protocol.