Syndetics cover image
Image from Syndetics

Security for multihop wireless networks / [edited by] Shafiullah Khan and Jaime Lloret Mauri.

Contributor(s): Khan, Shafiullah [editor.] | Lloret Mauri, Jaime [editor.].
Material type: TextTextPublisher: Boca Raton : CRC Press, Taylor & Francis Group, [2014]General Notes: EBSCO PDA Program.Bibliography: Includes bibliographical references and index.Description: 1 online resource (xiv, 524 pages) : illustrations.Content type: text Media type: computer Carrier type: online resourceISBN: 9781466578043 (eBook); 1466578041 (eBook).Subject(s): Wireless communication systems -- Security measures | Ad hoc networks (Computer networks) -- Security measures | Wireless sensor networks -- Security measuresGenre/Form: Electronic books. DDC classification: 621.382 Online resources: Access full-text materials at no charge:
Contents:
Front Cover; Contents; Preface; Contributors; Chapter 1: Taxonomy and Holistic Detection of Security Attacks in MANETs; Chapter 2: Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks; Chapter 3: Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks; Chapter 4: Fighting against Black Hole Attacks in Mobile Ad Hoc Networks; Chapter 5: Mutual Authentication in IP Mobility-Enabled Multihop Wireless Networks; Chapter 6: Detection of Misbehaving Nodes in Vehicular Ad Hoc Network
Chapter 7: Security Architecture for Multihop Wireless Sensor NetworksChapter 8: Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach; Chapter 9: TinyKey: A Pragmatic and Energy Efficient Security Layer for Wireless Sensor Networks; Chapter 10: Secure Multipurpose Wireless Sensor Networks; Chapter 11: Anomaly Detection in Wireless Sensor Networks: Challenges and Future Trends; Chapter 12: Taxonomy of Security Protocols for Wireless Sensor Communications
Chapter 13: Securing the Control of Euler-Lagrange Systems in Networked Environments with Model-Free Sliding Mode ControlChapter 14: Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc Networks; Chapter 15: Security Issues in Machine-to-Machine Communication; Chapter 16: Authentication in Wireless Mesh Networks; Chapter 17: Wireless-Based Application-Layer Cross-Layer Design with Simultaneous Quality of Service and Security Support; Chapter 18: Security, Trust, and Privacy in Opportunistic Multihop Wireless Networks; Back Cover
Summary: Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
E-book Davenport Library e-book E-book 621.382 (Browse shelf(Opens below)) Not For Loan mq587399

EBSCO PDA Program

Includes bibliographical references and index.

Front Cover; Contents; Preface; Contributors; Chapter 1: Taxonomy and Holistic Detection of Security Attacks in MANETs; Chapter 2: Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks; Chapter 3: Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks; Chapter 4: Fighting against Black Hole Attacks in Mobile Ad Hoc Networks; Chapter 5: Mutual Authentication in IP Mobility-Enabled Multihop Wireless Networks; Chapter 6: Detection of Misbehaving Nodes in Vehicular Ad Hoc Network

Chapter 7: Security Architecture for Multihop Wireless Sensor NetworksChapter 8: Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach; Chapter 9: TinyKey: A Pragmatic and Energy Efficient Security Layer for Wireless Sensor Networks; Chapter 10: Secure Multipurpose Wireless Sensor Networks; Chapter 11: Anomaly Detection in Wireless Sensor Networks: Challenges and Future Trends; Chapter 12: Taxonomy of Security Protocols for Wireless Sensor Communications

Chapter 13: Securing the Control of Euler-Lagrange Systems in Networked Environments with Model-Free Sliding Mode ControlChapter 14: Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc Networks; Chapter 15: Security Issues in Machine-to-Machine Communication; Chapter 16: Authentication in Wireless Mesh Networks; Chapter 17: Wireless-Based Application-Layer Cross-Layer Design with Simultaneous Quality of Service and Security Support; Chapter 18: Security, Trust, and Privacy in Opportunistic Multihop Wireless Networks; Back Cover

Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer.

Description based on online resource; title from PDF title page (CRCnetBASE, viewed on May 23, 2014).

There are no comments on this title.

to post a comment.

Powered by Koha