Read more
Informationen zum Autor Shafiullah Khan, Jaime Lloret Mauri Zusammenfassung Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter! it explores security in mobile ad hoc networks! wireless sensor networks! wireless mesh networks! and personal area networks.Detailing technologies and processes that can help you secure your wireless networks! the book covers cryptographic coprocessors! encryption! authentication! key management! attacks and countermeasures! secure routing! secure medium access control! intrusion detection! epidemics! security performance analysis! and security issues in applications. It identifies vulnerabilities in the physical! MAC! network! transport! and application layers and details proven methods for strengthening security mechanisms in each layer.The text explains how to deal with black hole attacks in mobile ad hoc networks and describes how to detect misbehaving nodes in vehicular ad hoc networks. It identifies a pragmatic and energy efficient security layer for wireless sensor networks and covers the taxonomy of security protocols for wireless sensor communications.Exploring recent trends in the research and development of multihop network security! the book outlines possible defenses against packet-dropping attacks in wireless multihop ad hoc networks.Complete with expectations for the future in related areas! thisis an ideal referencefor researchers! industry professionals! and academics. Its comprehensive coverage also makes it suitable for use as a textbook in graduate-level electrical engineering programs. Inhaltsverzeichnis SECURITY IN MOBILE AD HOC NETWORKSTaxonomy and Holistic Detection of Security Attacks in MANETs; P. García-Teodoro! L. Sánchez-Casado! and G. Maciá-FernándezSecurity and Privacy for Routing Protocols in Mobile Ad Hoc Networks; Mohamed Amine Ferrag! Mehdi Nafa! and Salim GhanemiPrivacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks; A. S. Khan! N. Fisal! M. Esa! S. Kamilah! Suleiman Zubair! W. Maqbool! and Z. Abu BakarFighting against Black Hole Attacks in Mobile Ad Hoc Networks; Manuel D. Serrat-Olmos! Enrique Hernández-Orallo! Juan-Carlos Cano! Carlos T. Calafate! and Pietro ManzoniMutual Authentication in IP Mobility-Enabled Multihop Wireless Networks; Sanaa Taha! Sandra Céspedes! and Xuemin (Sherman) ShenDetection of Misbehaving Nodes in Vehicular Ad-Hoc Network; Rajesh P. Barnwal and Soumya K. GhoshSECURITY IN WIRELESS SENSOR NETWORKSSecurity Architecture for Multihop Wireless Sensor Networks; Ismail Mansour! Gerard Chalhoub! and Michel MissonOptimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach; Dauda AyandaTinyKey: A Pragmatic and Energy Efficient Security Layer for Wireless Sensor Networks; Roberto Doriguzzi Corin! Giovanni Russello! and Elio Salvadori Secure Multipurpose Wireless Sensor Networks; Daniel Jacobi! Marc Fischlin! and Alejandro BuchmannAnomaly Detection in Wireless Sensor Networks: Challenges and Future Trends; Muhammad Usman! Vallipuram Muthukkumarasamy! Xin-Wen Wu! and Surraya KhanumTaxonomy of Security Protocols for Wireless Sensor Communications; Jasone Astorga! Eduardo Jacob! Nerea Toledo! and Marivi HigueroSECURITY IN OTHER AD-HOC NETWORKSSecuring the Control of Euler-Lagrange Systems in Networked Environments with Model-Free Sliding Mode Control; Shuai Li! Yunpeng Wang! and Long ChengDefenses against Packet-Dropping Attacks in Wireless Multihop Ad-Hoc Networks; L. Sánche z-Casado! R. Magán-Carrión! P. García-Teodoro! and J.E. Díaz-VerdejoSecurity Issues in Machine-to-Machine Communication; Shuo Chen and Maode MaAuthentication in Wireless Mesh Networks; Aymen Boudguiga and Maryline LaurentWireless-Based Application-Layer Cross-Layer Design with Simultaneous Quality of Service and Security S...