Wireless Network Security

Pirmais vāks
Yang Xiao, Xuemin Shen, Ding-Zhu Du
Springer Science & Business Media, 2007. gada 29. dec. - 424 lappuses

This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.

No grāmatas satura

Saturs

An Adaptive Encryption Protocol in Mobile Computing
43
PreAuthentication and Authentication Models
64
Promoting IdentityBased Key Management
83
A Survey of Attacks and Countermeasures
103
Giruka and Mukesh Singhal
138
A Survey on Intrusion Detection
159
Intrusion Detection in Cellular Mobile Networks 183
182
The Spread of Epidemics on Smartphones
211
Security in Wireless LANs
243
AAA Architecture and Authentication
273
An Experimental Study on Security Protocols in WLANs
295
Security Issues in Wireless Sensor Networks
324
Key Management Schemes in Sensor Networks
341
Secure Routing in Ad Hoc and Sensor Networks
381
About the Editors
403
Autortiesības

Citi izdevumi - Skatīt visu

Bieži izmantoti vārdi un frāzes

Populāri fragmenti

134. lappuse - Giuli, K. Lai and M. Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks.
179. lappuse - J. Broch, DB Johnson, and DA Maltz. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks.
134. lappuse - In Proceedings of the sixth annual international conference on Mobile computing and networking (Mobicom '00), pages 56-67, Nov2003. 18. B. KarpandH. T. Kung. GPSR: Greedy perimeter stateless routing for wireless networks.
211. lappuse - Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Email: {zhangfan, chanson} @cs.ust.hk Abstract Multimedia applications over the Internet are becoming increasingly popular.
157. lappuse - Mobile Ad Hoc Networks. In Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'02) (2002) 206-216 11.
229. lappuse - C is much larger than that of a random graph with the same number of vertices and average number of edges per vertex.
321. lappuse - N. Borisov, I. Goldberg, and D. Wagner, "Intercepting Mobile Communications: The Insecurity of 802.11", proceedings of the Seventh Annual International Conference on Mobile Computing and Networking, 2001.
380. lappuse - C. Karlof, N. Sastry, and D. Wagner. Tinysec: A link layer security architecture for wireless sensor networks.
81. lappuse - D. Balfanz, DK Smetters, P. Stewart, and H. Chi Wong, Talking to Strangers: Authentication in AdHoc Wireless Networks, Proceedings of Network and Distributed System Security Symposium 2002 (NDSS '02), 2002.
250. lappuse - The formula X is fresh, that is, X has not been sent in a message at any time before the current run of the protocol.

Bibliogrāfiskā informācija