Book description
Presenting cutting-edge research, this book explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it provides readers with the understanding required to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks. This edited volume includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems.
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents
- Preface
- About the Editors
- Contributors
- Chapter 1: Introduction (1/9)
- Chapter 1: Introduction (2/9)
- Chapter 1: Introduction (3/9)
- Chapter 1: Introduction (4/9)
- Chapter 1: Introduction (5/9)
- Chapter 1: Introduction (6/9)
- Chapter 1: Introduction (7/9)
- Chapter 1: Introduction (8/9)
- Chapter 1: Introduction (9/9)
- Chapter 2: Architecture and Organization Issues (1/6)
- Chapter 2: Architecture and Organization Issues (2/6)
- Chapter 2: Architecture and Organization Issues (3/6)
- Chapter 2: Architecture and Organization Issues (4/6)
- Chapter 2: Architecture and Organization Issues (5/6)
- Chapter 2: Architecture and Organization Issues (6/6)
- Chapter 3: Routing for Ad-Hoc Networks (1/5)
- Chapter 3: Routing for Ad-Hoc Networks (2/5)
- Chapter 3: Routing for Ad-Hoc Networks (3/5)
- Chapter 3: Routing for Ad-Hoc Networks (4/5)
- Chapter 3: Routing for Ad-Hoc Networks (5/5)
- Chapter 4: Different Types of Attacks for WANs (1/4)
- Chapter 4: Different Types of Attacks for WANs (2/4)
- Chapter 4: Different Types of Attacks for WANs (3/4)
- Chapter 4: Different Types of Attacks for WANs (4/4)
- Chapter 5: Honesty and Trust-Based IDS Solutions (1/8)
- Chapter 5: Honesty and Trust-Based IDS Solutions (2/8)
- Chapter 5: Honesty and Trust-Based IDS Solutions (3/8)
- Chapter 5: Honesty and Trust-Based IDS Solutions (4/8)
- Chapter 5: Honesty and Trust-Based IDS Solutions (5/8)
- Chapter 5: Honesty and Trust-Based IDS Solutions (6/8)
- Chapter 5: Honesty and Trust-Based IDS Solutions (7/8)
- Chapter 5: Honesty and Trust-Based IDS Solutions (8/8)
- Chapter 6: Blackhole Attack Detection Technique (1/5)
- Chapter 6: Blackhole Attack Detection Technique (2/5)
- Chapter 6: Blackhole Attack Detection Technique (3/5)
- Chapter 6: Blackhole Attack Detection Technique (4/5)
- Chapter 6: Blackhole Attack Detection Technique (5/5)
- Chapter 7: Intrusion Detection for Wireless Mesh Networks (1/6)
- Chapter 7: Intrusion Detection for Wireless Mesh Networks (2/6)
- Chapter 7: Intrusion Detection for Wireless Mesh Networks (3/6)
- Chapter 7: Intrusion Detection for Wireless Mesh Networks (4/6)
- Chapter 7: Intrusion Detection for Wireless Mesh Networks (5/6)
- Chapter 7: Intrusion Detection for Wireless Mesh Networks (6/6)
- Chapter 8: Future Trends in WAN Security (1/6)
- Chapter 8: Future Trends in WAN Security (2/6)
- Chapter 8: Future Trends in WAN Security (3/6)
- Chapter 8: Future Trends in WAN Security (4/6)
- Chapter 8: Future Trends in WAN Security (5/6)
- Chapter 8: Future Trends in WAN Security (6/6)
- Back Cover
Product information
- Title: Intrusion Detection in Wireless Ad-Hoc Networks
- Author(s):
- Release date: February 2014
- Publisher(s): CRC Press
- ISBN: 9781466515673
You might also like
book
Intrusion Detection Networks
The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use …
book
Security in Wireless Ad Hoc and Sensor Networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks Security …
book
Physical Layer Security in Wireless Communications
Physical layer security has recently become an emerging technique to complement and significantly improve the communication …
book
Wireless Ad Hoc and Sensor Networks
Although wireless sensor networks (WSNs) have been employed across a range of applications, there are few …