Security for Multihop Wireless Networks

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.

Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer.

The text explains how to deal with black hole attacks in mobile ad hoc networks and describes how to detect misbehaving nodes in vehicular ad hoc networks. It identifies a pragmatic and energy efficient security layer for wireless sensor networks and covers the taxonomy of security protocols for wireless sensor communications.

Exploring recent trends in the research and development of multihop network security, the book outlines possible defenses against packet-dropping attacks in wireless multihop ad hoc networks.Complete with expectations for the future in related areas, this is an ideal reference for researchers, industry professionals, and academics. Its comprehensive coverage also makes it suitable for use as a textbook in graduate-level electrical engineering programs.

Author(s): Shafiullah Khan, Jaime Lloret Mauri
Publisher: CRC Press
Year: 2014

Language: English
Pages: xiv+524
Tags: Связь и телекоммуникации;Мобильная связь;

SECURITY IN MOBILE AD HOC NETWORKS
Taxonomy and Holistic Detection of Security Attacks in MANETs; P. García-Teodoro, L. Sánchez-Casado, and G. Maciá-Fernández
Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks; Mohamed Amine Ferrag, Mehdi Nafa, and Salim Ghanemi
Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks; A. S. Khan, N. Fisal, M. Esa, S. Kamilah, Suleiman Zubair, W. Maqbool, and Z. Abu Bakar
Fighting against Black Hole Attacks in Mobile Ad Hoc Networks; Manuel D. Serrat-Olmos, Enrique Hernández-Orallo, Juan-Carlos Cano, Carlos T. Calafate, and Pietro Manzoni
Mutual Authentication in IP Mobility-Enabled Multihop Wireless Networks; Sanaa Taha, Sandra Céspedes, and Xuemin (Sherman) Shen
Detection of Misbehaving Nodes in Vehicular Ad-Hoc Network; Rajesh P. Barnwal and Soumya K. Ghosh

SECURITY IN WIRELESS SENSOR NETWORKS
Security Architecture for Multihop Wireless Sensor Networks; Ismail Mansour, Gerard Chalhoub, and Michel Misson
Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach; Dauda Ayanda
TinyKey: A Pragmatic and Energy Efficient Security Layer for Wireless Sensor Networks; Roberto Doriguzzi Corin, Giovanni Russello, and Elio Salvadori
Secure Multipurpose Wireless Sensor Networks; Daniel Jacobi, Marc Fischlin, and Alejandro Buchmann
Anomaly Detection in Wireless Sensor Networks: Challenges and Future Trends; Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu, and Surraya Khanum
Taxonomy of Security Protocols for Wireless Sensor Communications; Jasone Astorga, Eduardo Jacob, Nerea Toledo, and Marivi Higuero

SECURITY IN OTHER AD-HOC NETWORKS
Securing the Control of Euler–Lagrange Systems in Networked Environments with Model-Free Sliding Mode Control; Shuai Li, Yunpeng Wang, and Long Cheng
Defenses against Packet-Dropping Attacks in Wireless Multihop Ad-Hoc Networks; L. Sánchez-Casado, R. Magán-Carrión, P. García-Teodoro, and J.E. Díaz-Verdejo
Security Issues in Machine-to-Machine Communication; Shuo Chen and Maode Ma
Authentication in Wireless Mesh Networks; Aymen Boudguiga and Maryline Laurent
Wireless-Based Application-Layer Cross-Layer Design with Simultaneous Quality of Service and Security Support; Sasan Adibi
Security, Trust, and Privacy in Opportunistic Multihop Wireless Networks; M. Bala Krishna