Zhang / Zheng / Hu | Security in Wireless Mesh Networks | E-Book | sack.de
E-Book

E-Book, Englisch, 552 Seiten

Reihe: Wireless Networks and Mobile Communications

Zhang / Zheng / Hu Security in Wireless Mesh Networks


1. Auflage 2008
ISBN: 978-0-8493-8254-3
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 552 Seiten

Reihe: Wireless Networks and Mobile Communications

ISBN: 978-0-8493-8254-3
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. To achieve these aims, security mechanisms are essential to ensure trusted on-going communications. Security in Wireless Mesh Networks explores key security challenges set in diverse scenarios, as well as emerging standards that include authentication, access control and authorization, attacks, privacy and trust, encryption, key management, identity management, DoS attacks, intrusion detection and prevention, secure routing, and security policies. The book also examines security mechanisms in IEEE 802.11, IEEE 802.15, IEEE 802.16, and IEEE 802.20 standards.  In addition, it provides numerous case studies and applications to facilitate understanding. As a single, comprehensive guide to security-related issues in WMN, this book is an important resource to have if you are working on the design, selection, and implementation of wireless mesh networks and system components.

Zhang / Zheng / Hu Security in Wireless Mesh Networks jetzt bestellen!

Zielgruppe


Undergraduates, postgraduates, educators, researchers, engineers, and developers.

Weitere Infos & Material


PART I: INTRODUCTION
An Introduction to Wireless Mesh Networks A. Antony Franklin and C. Siva Ram Murthy
Mesh Networking in Wireless PANs, LANs, MANs,
and WANs N. Krichene and N. Boudriga
PART II: SECURITY PROTOCOLS AND TECHNIQUES
Attacks and Security Mechanisms A. Naveed, S. S. Kanhere, and S. K. Jha
Intrusion Detection in Wireless Mesh Networks T. M. Chen, G.-S. Kuo, Z.-P. Li,
and G.-M. Zhu
Secure Routing in Wireless Mesh Networks M. G. Zapata
Hop Integrity in Wireless Mesh Networks C.-T. Huang
Privacy Preservation in Wireless Mesh Networks T. Wu, Y. Xue, and Y. Cui
Providing Authentication, Trust, and Privacy in
Wireless Mesh Networks H. Moustafa
Non-Interactive Key Establishment in Wireless
Mesh Networks Z. Li and J.J. Garcia-Luna-Aceves
Key Management in Wireless Mesh Networks M. G. Zapata
PART III: SECURITY STANDARDS, APPLICATIONS, AND ENABLING TECHNOLOGIES
Security in Wireless PAN Mesh Networks S. Seys, D. Singelee, and B. Preneel
Security in Wireless LAN Mesh Networks N. Cam-Winget and S. Rahman
Security in IEEE 802.15.4 Cluster-Based Networks M. Khan and J. Misic
Security in Wireless Sensor Networks Y. Wang, G. Attebury, and B. Ramamurthy
Key Management in Wireless Sensor Networks F. Dressler
INDEX



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.