E-Book, Englisch, 638 Seiten
Pathan Security of Self-Organizing Networks
1. Auflage 2010
ISBN: 978-1-4398-1920-3
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
MANET, WSN, WMN, VANET
E-Book, Englisch, 638 Seiten
ISBN: 978-1-4398-1920-3
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Reflecting recent advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and often-used terms to set the foundation for the following chapters. Examining critical security issues in a range of wireless networks, the book proposes specific solutions to security threats.
Ideal for those with a basic understanding of network security, the text provides a clear examination of the key aspects of security in self-organizing networks and other networks that use wireless technology for communications. The book is organized into four sections for ease of reference:
- General Topics—Security of Wireless and Self-Organizing Networks
- Mobile Ad-Hoc Network and Vehicular Ad-Hoc Network Security
- Wireless Sensor Network Security
- Wireless Mesh Network Security
Highlighting potential threats to network security, most chapters are written in a tutorial manner. However, some of the chapters include mathematical equations and detailed analysis for advanced readers. Guiding you through the latest trends, issues, and advances in network security, the text includes questions and sample answers in each chapter to reinforce understanding.
Zielgruppe
researchers, academics, graduate students in wireless technology.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
GENERAL TOPICS—SECURITY OF WIRELESS AND SELF-ORGANIZING NETWORKS
Secure Device Association: Trends and Issues; Yasir Arfat Malkani, Dan Chalmers, and Ianwakeman
Securing Route and Path Integrity in Multihop Wireless Networks; Stephen Glass, Marius Portmann, and Vallipuram Muthukkumarasamy
Handling Security Threats to the RFID System of EPC Networks; Joaquin Garcia-Alfaro, Michel Barbeau, and Evangelos Kranakis
Survey of Anomaly Detection Algorithms: Toward Self-Learning Networks; Tarem Ahmed and Rumana Rahman
Reputation- and Trust-Based Systems forWireless Self-Organizing Networks; Jaydip Sen
MOBILE AD-HOC NETWORK AND VEHICULAR AD-HOC NETWORK SECURITY
Security Threats in Mobile Ad Hoc Networks; Sevil Sen, John A. Clark, and Juan E. Tapiador
Key Management in Mobile Ad Hoc Networks; Sudip Misra and Sumit Goswami
Combating Against Security Attacks Against Mobile Ad Hoc Networks (MANETs); Zubair MD. Fadlullah, Tarik Taleb, and Marcus Schöller
Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Network: A Survey; Vikrant Gokhale, S.K. Ghosh, and Arobinda Gupta
Security in Vehicular Ad Hoc Networks; Vikas Singh Yadav, Sudip Misra, and Mozaffar Afaque
Toward a Robust Trust Model for Ensuring Security and Privacy in VANETs; Une Thoing Rosi and Syed Ishtiaque Ahmed
Sybil Attack in VANETs: Detection and Prevention; Jyoti Grover, M.S. Gaur, and V. Laxmi
WIRELESS SENSOR NETOWRK SECURITY
Key Management Schemes of Wireless Sensor Networks: A Survey; Syed Muhammad Khaliq-Ur-Rahman Raazi, Zeeshan Pervez, and Sungyoung Lee
Key Management Techniques for Wireless Sensor Networks: Practical and Theoretical Considerations; Effie Makri and Yannis C. Stamatiou
Bio-Inspired Intrusion Detection for Wireless Sensor Networks; Swapna Ghanekar, Nancy Alrajei, and Fatma Mili
Biological Inspired Autonomously Secure Mechanism for Wireless Sensor Networks; Kashif Saleem, Norsheila Fisal, Sharifah Hafizah Syed Ariffin, Sharifah Kamilah Syed Yusof, and Rozeha A. Rashid
Network Invading Attack on Key Pre-Distribution Schemes for Distributed Sensor Networks and Countermeasures; Thanh Dai Tran and Johnson I. Agbinya
Proactive Key Variation Owing to Dynamic Clustering (PERIODIC) in Sensor Networks; Gicheolwang and Gihwan Cho
Secure Routing Architectures Using Cross-Layer Information for Attack Avoidance (With Case Study on Wormhole Attack); James Harbin, Paul Mitchell, and David Pearce
Reputation-Based Trust Systems inWireless Sensor Networks; Hani Alzaid
MajorWorks on the Necessity and Implementations of PKC in WSNs: A Beginner’s Note; Al-Sakib Khan Pathan
WIRELESS MESH NETWORK SECURITY
Secure Access Control and Authentication in Wireless Mesh Networks; Bing He, Bin Xie, David Zhao, and Ranga Reddy
Misbehavior Detection in Wireless Mesh Networks; MD. Abdul Hamid and MD. Shariful Islam