Book description
This book provides broad coverage of the security issues facing multihop wireless networks, including mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes for securing today's networks, it includes coverage of cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical layer, MAC layer, network layer, transport layer, and application layer, and outlines proven methods for strengthening security mechanisms in each layer.
Table of contents
- Front Cover
- Contents
- Preface
- Contributors (1/2)
- Contributors (2/2)
- Chapter 1: Taxonomy and Holistic Detection of Security Attacks in MANETs (1/4)
- Chapter 1: Taxonomy and Holistic Detection of Security Attacks in MANETs (2/4)
- Chapter 1: Taxonomy and Holistic Detection of Security Attacks in MANETs (3/4)
- Chapter 1: Taxonomy and Holistic Detection of Security Attacks in MANETs (4/4)
- Chapter 2: Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks (1/5)
- Chapter 2: Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks (2/5)
- Chapter 2: Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks (3/5)
- Chapter 2: Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks (4/5)
- Chapter 2: Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks (5/5)
- Chapter 3: Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks (1/6)
- Chapter 3: Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks (2/6)
- Chapter 3: Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks (3/6)
- Chapter 3: Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks (4/6)
- Chapter 3: Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks (5/6)
- Chapter 3: Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks (6/6)
- Chapter 4: Fighting against Black Hole Attacks in Mobile Ad Hoc Networks (1/6)
- Chapter 4: Fighting against Black Hole Attacks in Mobile Ad Hoc Networks (2/6)
- Chapter 4: Fighting against Black Hole Attacks in Mobile Ad Hoc Networks (3/6)
- Chapter 4: Fighting against Black Hole Attacks in Mobile Ad Hoc Networks (4/6)
- Chapter 4: Fighting against Black Hole Attacks in Mobile Ad Hoc Networks (5/6)
- Chapter 4: Fighting against Black Hole Attacks in Mobile Ad Hoc Networks (6/6)
- Chapter 5: Mutual Authentication in IP Mobility-Enabled Multihop Wireless Networks (1/5)
- Chapter 5: Mutual Authentication in IP Mobility-Enabled Multihop Wireless Networks (2/5)
- Chapter 5: Mutual Authentication in IP Mobility-Enabled Multihop Wireless Networks (3/5)
- Chapter 5: Mutual Authentication in IP Mobility-Enabled Multihop Wireless Networks (4/5)
- Chapter 5: Mutual Authentication in IP Mobility-Enabled Multihop Wireless Networks (5/5)
- Chapter 6: Detection of Misbehaving Nodes in Vehicular Ad Hoc Network (1/7)
- Chapter 6: Detection of Misbehaving Nodes in Vehicular Ad Hoc Network (2/7)
- Chapter 6: Detection of Misbehaving Nodes in Vehicular Ad Hoc Network (3/7)
- Chapter 6: Detection of Misbehaving Nodes in Vehicular Ad Hoc Network (4/7)
- Chapter 6: Detection of Misbehaving Nodes in Vehicular Ad Hoc Network (5/7)
- Chapter 6: Detection of Misbehaving Nodes in Vehicular Ad Hoc Network (6/7)
- Chapter 6: Detection of Misbehaving Nodes in Vehicular Ad Hoc Network (7/7)
- Chapter 7: Security Architecture for Multihop Wireless Sensor Networks (1/5)
- Chapter 7: Security Architecture for Multihop Wireless Sensor Networks (2/5)
- Chapter 7: Security Architecture for Multihop Wireless Sensor Networks (3/5)
- Chapter 7: Security Architecture for Multihop Wireless Sensor Networks (4/5)
- Chapter 7: Security Architecture for Multihop Wireless Sensor Networks (5/5)
- Chapter 8: Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach (1/9)
- Chapter 8: Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach (2/9)
- Chapter 8: Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach (3/9)
- Chapter 8: Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach (4/9)
- Chapter 8: Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach (5/9)
- Chapter 8: Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach (6/9)
- Chapter 8: Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach (7/9)
- Chapter 8: Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach (8/9)
- Chapter 8: Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach (9/9)
- Chapter 9: TinyKey: A Pragmatic and Energy Efficient Security Layer for Wireless Sensor Networks (1/5)
- Chapter 9: TinyKey: A Pragmatic and Energy Efficient Security Layer for Wireless Sensor Networks (2/5)
- Chapter 9: TinyKey: A Pragmatic and Energy Efficient Security Layer for Wireless Sensor Networks (3/5)
- Chapter 9: TinyKey: A Pragmatic and Energy Efficient Security Layer for Wireless Sensor Networks (4/5)
- Chapter 9: TinyKey: A Pragmatic and Energy Efficient Security Layer for Wireless Sensor Networks (5/5)
- Chapter 10: Secure Multipurpose Wireless Sensor Networks (1/6)
- Chapter 10: Secure Multipurpose Wireless Sensor Networks (2/6)
- Chapter 10: Secure Multipurpose Wireless Sensor Networks (3/6)
- Chapter 10: Secure Multipurpose Wireless Sensor Networks (4/6)
- Chapter 10: Secure Multipurpose Wireless Sensor Networks (5/6)
- Chapter 10: Secure Multipurpose Wireless Sensor Networks (6/6)
- Chapter 11: Anomaly Detection in Wireless Sensor Networks: Challenges and Future Trends (1/7)
- Chapter 11: Anomaly Detection in Wireless Sensor Networks: Challenges and Future Trends (2/7)
- Chapter 11: Anomaly Detection in Wireless Sensor Networks: Challenges and Future Trends (3/7)
- Chapter 11: Anomaly Detection in Wireless Sensor Networks: Challenges and Future Trends (4/7)
- Chapter 11: Anomaly Detection in Wireless Sensor Networks: Challenges and Future Trends (5/7)
- Chapter 11: Anomaly Detection in Wireless Sensor Networks: Challenges and Future Trends (6/7)
- Chapter 11: Anomaly Detection in Wireless Sensor Networks: Challenges and Future Trends (7/7)
- Chapter 12: Taxonomy of Security Protocols for Wireless Sensor Communications (1/10)
- Chapter 12: Taxonomy of Security Protocols for Wireless Sensor Communications (2/10)
- Chapter 12: Taxonomy of Security Protocols for Wireless Sensor Communications (3/10)
- Chapter 12: Taxonomy of Security Protocols for Wireless Sensor Communications (4/10)
- Chapter 12: Taxonomy of Security Protocols for Wireless Sensor Communications (5/10)
- Chapter 12: Taxonomy of Security Protocols for Wireless Sensor Communications (6/10)
- Chapter 12: Taxonomy of Security Protocols for Wireless Sensor Communications (7/10)
- Chapter 12: Taxonomy of Security Protocols for Wireless Sensor Communications (8/10)
- Chapter 12: Taxonomy of Security Protocols for Wireless Sensor Communications (9/10)
- Chapter 12: Taxonomy of Security Protocols for Wireless Sensor Communications (10/10)
- Chapter 13: Securing the Control of Euler–Lagrange Systems in Networked Environments with Model-Free Sliding Mode Control (1/5)
- Chapter 13: Securing the Control of Euler–Lagrange Systems in Networked Environments with Model-Free Sliding Mode Control (2/5)
- Chapter 13: Securing the Control of Euler–Lagrange Systems in Networked Environments with Model-Free Sliding Mode Control (3/5)
- Chapter 13: Securing the Control of Euler–Lagrange Systems in Networked Environments with Model-Free Sliding Mode Control (4/5)
- Chapter 13: Securing the Control of Euler–Lagrange Systems in Networked Environments with Model-Free Sliding Mode Control (5/5)
- Chapter 14: Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc Networks (1/5)
- Chapter 14: Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc Networks (2/5)
- Chapter 14: Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc Networks (3/5)
- Chapter 14: Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc Networks (4/5)
- Chapter 14: Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc Networks (5/5)
- Chapter 15: Security Issues in Machine-to-Machine Communication (1/4)
- Chapter 15: Security Issues in Machine-to-Machine Communication (2/4)
- Chapter 15: Security Issues in Machine-to-Machine Communication (3/4)
- Chapter 15: Security Issues in Machine-to-Machine Communication (4/4)
- Chapter 16: Authentication in Wireless Mesh Networks (1/6)
- Chapter 16: Authentication in Wireless Mesh Networks (2/6)
- Chapter 16: Authentication in Wireless Mesh Networks (3/6)
- Chapter 16: Authentication in Wireless Mesh Networks (4/6)
- Chapter 16: Authentication in Wireless Mesh Networks (5/6)
- Chapter 16: Authentication in Wireless Mesh Networks (6/6)
- Chapter 17: Wireless-Based Application-Layer Cross-Layer Design with Simultaneous Quality of Service and Security Support (1/6)
- Chapter 17: Wireless-Based Application-Layer Cross-Layer Design with Simultaneous Quality of Service and Security Support (2/6)
- Chapter 17: Wireless-Based Application-Layer Cross-Layer Design with Simultaneous Quality of Service and Security Support (3/6)
- Chapter 17: Wireless-Based Application-Layer Cross-Layer Design with Simultaneous Quality of Service and Security Support (4/6)
- Chapter 17: Wireless-Based Application-Layer Cross-Layer Design with Simultaneous Quality of Service and Security Support (5/6)
- Chapter 17: Wireless-Based Application-Layer Cross-Layer Design with Simultaneous Quality of Service and Security Support (6/6)
- Chapter 18: Security, Trust, and Privacy in Opportunistic Multihop Wireless Networks (1/6)
- Chapter 18: Security, Trust, and Privacy in Opportunistic Multihop Wireless Networks (2/6)
- Chapter 18: Security, Trust, and Privacy in Opportunistic Multihop Wireless Networks (3/6)
- Chapter 18: Security, Trust, and Privacy in Opportunistic Multihop Wireless Networks (4/6)
- Chapter 18: Security, Trust, and Privacy in Opportunistic Multihop Wireless Networks (5/6)
- Chapter 18: Security, Trust, and Privacy in Opportunistic Multihop Wireless Networks (6/6)
- Back Cover
Product information
- Title: Security for Multihop Wireless Networks
- Author(s):
- Release date: April 2014
- Publisher(s): CRC Press
- ISBN: 9781466578043
You might also like
book
Multimedia over IP and Wireless Networks
This all-inclusive, expertly structured contributed volume will serve as an indispensable guide for professionals or researchers …
book
The Future of Wireless Networks
The exponential increase in mobile device users and high-bandwidth applications has pushed the current wireless networks …
book
Wireless Sensor Networks
Acquiring data from the deployment area of a WSN is not always easy and multiple issues …
book
Building Wireless Sensor Networks
This book presents the state of the art of wireless sensor networks (WSNs) from fundamental concepts …