Intrusion Detection in Wireless Ad-Hoc Networks

Book description

Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents
  4. Preface
  5. About the Editors
  6. Contributors
  7. Chapter 1: Introduction (1/9)
  8. Chapter 1: Introduction (2/9)
  9. Chapter 1: Introduction (3/9)
  10. Chapter 1: Introduction (4/9)
  11. Chapter 1: Introduction (5/9)
  12. Chapter 1: Introduction (6/9)
  13. Chapter 1: Introduction (7/9)
  14. Chapter 1: Introduction (8/9)
  15. Chapter 1: Introduction (9/9)
  16. Chapter 2: Architecture and Organization Issues (1/6)
  17. Chapter 2: Architecture and Organization Issues (2/6)
  18. Chapter 2: Architecture and Organization Issues (3/6)
  19. Chapter 2: Architecture and Organization Issues (4/6)
  20. Chapter 2: Architecture and Organization Issues (5/6)
  21. Chapter 2: Architecture and Organization Issues (6/6)
  22. Chapter 3: Routing for Ad-­Hoc Networks (1/5)
  23. Chapter 3: Routing for Ad-­Hoc Networks (2/5)
  24. Chapter 3: Routing for Ad-­Hoc Networks (3/5)
  25. Chapter 3: Routing for Ad-­Hoc Networks (4/5)
  26. Chapter 3: Routing for Ad-­Hoc Networks (5/5)
  27. Chapter 4: Different Types of Attacks for WANs (1/4)
  28. Chapter 4: Different Types of Attacks for WANs (2/4)
  29. Chapter 4: Different Types of Attacks for WANs (3/4)
  30. Chapter 4: Different Types of Attacks for WANs (4/4)
  31. Chapter 5: Honesty and Trust-­Based IDS Solutions (1/8)
  32. Chapter 5: Honesty and Trust-­Based IDS Solutions (2/8)
  33. Chapter 5: Honesty and Trust-­Based IDS Solutions (3/8)
  34. Chapter 5: Honesty and Trust-­Based IDS Solutions (4/8)
  35. Chapter 5: Honesty and Trust-­Based IDS Solutions (5/8)
  36. Chapter 5: Honesty and Trust-­Based IDS Solutions (6/8)
  37. Chapter 5: Honesty and Trust-­Based IDS Solutions (7/8)
  38. Chapter 5: Honesty and Trust-­Based IDS Solutions (8/8)
  39. Chapter 6: Blackhole Attack Detection Technique (1/5)
  40. Chapter 6: Blackhole Attack Detection Technique (2/5)
  41. Chapter 6: Blackhole Attack Detection Technique (3/5)
  42. Chapter 6: Blackhole Attack Detection Technique (4/5)
  43. Chapter 6: Blackhole Attack Detection Technique (5/5)
  44. Chapter 7: Intrusion Detection for Wireless Mesh Networks (1/6)
  45. Chapter 7: Intrusion Detection for Wireless Mesh Networks (2/6)
  46. Chapter 7: Intrusion Detection for Wireless Mesh Networks (3/6)
  47. Chapter 7: Intrusion Detection for Wireless Mesh Networks (4/6)
  48. Chapter 7: Intrusion Detection for Wireless Mesh Networks (5/6)
  49. Chapter 7: Intrusion Detection for Wireless Mesh Networks (6/6)
  50. Chapter 8: Future Trends in WAN Security (1/6)
  51. Chapter 8: Future Trends in WAN Security (2/6)
  52. Chapter 8: Future Trends in WAN Security (3/6)
  53. Chapter 8: Future Trends in WAN Security (4/6)
  54. Chapter 8: Future Trends in WAN Security (5/6)
  55. Chapter 8: Future Trends in WAN Security (6/6)
  56. Back Cover

Product information

  • Title: Intrusion Detection in Wireless Ad-Hoc Networks
  • Author(s): Nabendu Chaki, Rituparna Chaki
  • Release date: February 2014
  • Publisher(s): CRC Press
  • ISBN: 9781466515673