E-Book, Englisch, 224 Seiten
Makki / Reiher / Pissinou Mobile and Wireless Network Security and Privacy
1. Auflage 2007
ISBN: 978-0-387-71058-7
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, 224 Seiten
ISBN: 978-0-387-71058-7
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book brings together a number of papers that represent seminal contributions underlying mobile and wireless network security and privacy. It provides a foundation for implementation and standardization as well as further research. The diverse topics and protocols described in this book give the reader a good idea of the current state-of-the-art technologies in mobile and wireless network security and privacy.
Autoren/Hrsg.
Weitere Infos & Material
1;Contents;5
2;Preface;11
3;1 Research Directions in Security and Privacy for Mobile and Wireless Networks;14
3.1;1.1 Introduction;14
3.2;1.2 The State of the Art;17
3.3;1.3 Areas for Future Research;19
3.4;1.4 General Recommendations for Research;31
3.5;1.5 Conclusion;35
4;2 Pervasive Systems: Enhancing Trust Negotiation with Privacy Support;36
4.1;2.1 Introduction;36
4.2;2.2 Trust Negotiation;38
4.3;2.3 Weaknesses of Trust Negotiation;39
4.4;2.4 Extending Trust Negotiation to Support Privacy;44
4.5;2.5 Proposed Trust Protocol Extended to Support Privacy;46
4.6;2.6 Privacy Agreement;48
4.7;2.7 Conclusions;49
4.8;References;50
5;3 Applying Trust in Mobile and Wireless Networks;52
5.1;3.1 Introduction;52
5.2;3.2 Attack Analysis for MANETs;53
5.3;3.3 Existing Trust Models;58
5.4;3.4 Recent Trust Models;71
5.5;3.5 Conclusions;76
5.6;References;78
6;4 A Framework for Computing Trust in Mobile Ad- Hoc Networks;80
6.1;4.1 Introduction;80
6.2;4.2 Related Work;81
6.3;4.3 Proposed Model;82
6.4;4.4 Simulation;88
6.5;4.5 Conclusion;93
6.6;References;94
7;5 The Concept of Opportunistic Networks and their Research Challenges in Privacy and Security;97
7.1;5.1 Introduction;97
7.2;5.2 Opportunistic Networks: Basics of Operation;101
7.3;5.3 Example Oppnet Applications and Use Scenarios;105
7.4;5.4 Related Work in Privacy and Security;108
7.5;5.5 The Critical Significance of Privacy Challenges in Oppnets;114
7.6;5.6 Privacy and Security Challenges in Oppnets;116
7.7;5.7 Conclusions;123
7.8;Acknowledgements;124
7.9;References;125
8;6 On Performance Cost of On-demand Anonymous Routing Protocols in Mobile Ad Hoc Networks;130
8.1;6.1 Introduction;130
8.2;6.2 Anonymous Routing Revisited;134
8.3;6.3 Performance Evaluation;141
8.4;6.4 Related Work;149
8.5;6.5 Conclusion;150
8.6;References;151
9;7 Computer Ecology: Responding to Mobile Worms with Location- Based Quarantine Boundaries;154
9.1;7.1 Introduction;154
9.2;7.2 Threa ssessment t A;155
9.3;7.3 Quarantine Boundary Estimation;160
9.4;7.4 Evaluation;164
9.5;7.5 Discussion;170
9.6;7.6 Related Work;173
9.7;7.7 Conclusions;174
9.8;Acknowledgment;174
9.9;References;175
10;8 Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions;178
10.1;8.1 Introduction;178
10.2;8.2 Challenges of Unplanned Interactions;181
10.3;8.3 Approaches;185
10.4;8.4 Conclusion;196
10.5;References;197
11;9 An Anonymous MAC Protocol for Wireless Ad- hoc Networks;201
11.1;9.1 Introduction;201
11.2;9.2 Protocol Design;203
11.3;9.3 Security Analysis;207
11.4;9.4 Performance Evaluation;210
11.5;9.5 Conclusions;213
11.6;Acknowledgements;213
11.7;References;213
12;10 Hardware/Software Solution to Improve Security in Mobile Ad- hoc Networks;215
12.1;10.1 Introduction;215
12.2;10.2 Background and Related work 10.2.1 Detection, identification, and isolation of malicious nodes;217
12.3;10.2.2 Secure and QoS-aware routing;218
12.4;10.3 Comprehensive Software/Hardware Schemes for Security in Ad- hoc Networks;219
12.5;10.3.1 Detecting misbehavior, identifying and isolating malicious nodes;219
12.6;10.3.2 Secure, QoS-aware routing;225
12.7;10.4 Implications and Future Research;226
12.8;References;227
13;Index;228




