rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780470027486

Security in Wireless Ad Hoc and Sensor Networks

by ;
  • ISBN13:

    9780470027486

  • ISBN10:

    0470027487

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2009-02-17
  • Publisher: WILEY

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $145.01 Save up to $41.69
  • Rent Book $103.32
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-4 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

How To: Textbook Rental

Looking to rent a book? Rent Security in Wireless Ad Hoc and Sensor Networks [ISBN: 9780470027486] for the semester, quarter, and short term or search our site for other textbooks by Cayirci, Erdal; Rong, Chunming. Renting a textbook can save you up to 90% from the cost of buying.

Summary

This book provides an in-depth guide to security in wireless ad hoc and sensor networksSecurity in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and counter measures in wireless ad hoc, sensor and mesh networks, and briefly presents the standards on related topics. The authors offer a clear exposition of various challenges and solutions in this field including bootstrapping, key distribution and exchange, authentication issues, privacy, anonymity and tamper resilience.Key Features:Introduces the fundamentals and key issues of the new technologies followed by comprehensive presentation on security attacks and counter measures Covers Denial of Service (DoS) attacks, hardware aspects of secure wireless ad hoc and sensor networks and secure routing Contains information on cryptographic primitives and electronic warfare Includes problems at the end of each chapter to enhance learning. Offers an accompanying website with extra learning resources including over 400 PowerPoint slides.This book is well suited for graduate students in computer, electrical and communications engineering and computer science departments, researchers in academia and industry, as well as C4I engineers and officers in the military. Wireless network designers for internet service providers and mobile communications operators will also find this book very useful.

Author Biography

Erdal Çayirci graduated from the Army Academy in 1986 and from the Royal Military Academy, Sandhurst in 1989. He received his MS degree from the Middle East Technical University and a PhD from Bogazici University both in computer engineering in 1995 and 2000, respectively. He retired from the army when he was a colonel in 2005. He was an Associate Professor at Istanbul Technical University, Yeditepe University and the Naval Sciences and Engineering Institute between 2001 and 2005. Also in 2001, he was a visiting researcher for the Broadband and Wireless Networking Laboratory and a visiting lecturer at the School of Electrical and Computer Engineering, Georgia Institute of Technology. He is currently Chief, CAX Support Branch in NATO’s JointWarfare Center in Stavanger, Norway, and also a professor in the Electrical and Computer Engineering Department of the University of Stavanger. His research interests include military constructive simulation, sensor networks, mobile communications and tactical communications. Professor Çayirci has acted as an editor of the journals IEEE Transactions on Mobile Computing, Ad Hoc Networks and Wireless Networks, and has guest edited four special issues of Computer Networks, Ad Hoc Networks and Special Topics in Mobile Networking and Applications (MONET). He received the 2002 IEEE Communications Society Best Tutorial Paper Award for his paper entitled ‘A Survey on Sensor Networks’ published in the IEEE Communications Magazine in August 2002, the Fikri Gayret Award from the Turkish Chief of General Staff in 2003, the Innovation of the Year Award from the Turkish Navy in 2005 and the Excellence Award in ITEC in 2006.

Chunming Rong received his bachelors, masters and PhD degrees in Computer Science from the University of Bergen in Norway in 1993, 1995 and 1998, respectively. In 1995–1998, he was a research fellow at the University of Bergen. In 2001–2003, he was a post-doctoral researcher funded by Simula Research Laboratory. Currently, he is a Professor and chair of the computer science section at the University of Stavanger. He has also served as an adjunct Professor at the University Graduate Centre, University of Oslo, since 2005. Professor Rong was given the ConocoPhilips Communication Award (Norway) in 2007. His paper ‘New Infinite Families of 3-Designs from Preparata Codes over Z4 was awarded Editor’s Choice in Discrete Mathematics in 1999. He is an associate editor of the International Journal of Computer Science & Applications (IJCSA) and served on the editorial board of the International Journal of Mobile Communications (IJMC) between 2003 and 2006. For the IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS), he was program chair in 2007 in Canada and general chair in 2008. For the International Conference on Autonomic and Trusted Computing (ATC), he was award chair in 2007 in Hong Kong and general chair in 2008 in Norway. For the International Conference on Ubiquitous Intelligence and Computing (UIC), he was general chair in 2008 in Norway. Professor Rong was chairman of the board of the Foundation of the Norwegian Computer Science Conference (NIK) from 2005–2007, a board member of the Norwegian Information Security Network (NISNet) from 2007–2011 and a member of the Norwegian Informatics Council (Nasjonalt fagråd for informatikk). He has also been a member of the board for the ‘ICT Security and Vulnerability (IKT-SoS)’ program at the Research Council of Norway. He also currently serves in the workgroup for Information Security in Integrated Operation at the Norwegian Oil Industry Association (OLF). As project manager, he has received grants from the Research Council of Norway for the projects ‘Integration of Data Processing in Oil and Gas Drilling and Completion’ for 2008–2010, ‘Secure and Reliable Wireless and Ad Hoc Communications (SWACOM)’ for 2006–2009 and ‘Integrated IP-based Services for Smart Home Environment (IS-Home)’ for 2007–2010. The Norwegian Information Security Network (NISNet) also receives annual funding from the Research Council of Norway. His research interests include computer and network security, wireless communications, cryptography, identity management, electronic payment, coding theory and semantic web technology.

Table of Contents

About the Authors
Preface
Acknowledgements
List of Acronyms
Wireless Ad Hoc, Sensor and Mesh Networking
Introduction
Information Security
Scope of the Book
Structure of the Book
Electronic Resources for the Book
Review Questions
Wireless Ad Hoc, Sensor and Mesh Networks
Ad Hoc Networks and Applications
Sensor and Actuator Networks
Mesh Networks
Tactical Communications and Networks
Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks
Review Questions
The Wireless Medium
Wireless Channel Fundamentals and Security
Advanced Radio Technologies
Review Questions
Medium Access and Error Control
Medium Access Control
Error Control
Wireless Metropolitan Area Networks
Wireless Local Area Networks
Wireless Personal Area Networks
Review Questions
Routing
Internet Protocol and Mobile IP
Routing in Wireless Ad Hoc Networks
Routing in Wireless Sensor and Actuator Networks
Review Questions
Reliability, Flow and Congestion Control
Reliability
Flow and Congestion Control
Review Questions
Other Challenges and Security Aspects
Localization and Positioning
Time Synchronization
Addressing
Data Aggregation and Fusion
Data Querying
Coverage
Mobility Management
Cross-layer Design
Review Questions
Security in Wireless Ad Hoc, Sensor and Mesh Networking
Security Attacks in Ad Hoc, Sensor and Mesh Networks
Security Attacks
Attackers
Security Goals
Review Questions
Cryptography
Symmetric Encryption
Asymmetric Encryption
Hash Functions and Message Authentication Code
Cascading Hashing
Review Questions
Challenges and Solutions: Basic Issues
Bootstrapping Security in Ad Hoc Networks
Bootstrapping Security in Sensor Networks
Key Distribution, Exchange and Management
Authentication Issues
Integrity
Review Questions
Challenges and Solutions: Protection
Privacy and Anonymity
Intrusion Detection
Defense Against Traffic Analysis
Access Control and Secure Human-Computer Interaction
Software-Based Anti-Tamper Techniques
Tamper Resilience: Hardware Protection
Availability and Plausibility
Review Questions
Secure Routing
Defense Against Security Attacks in Ad Hoc Routing
Secure Ad Hoc Routing Protocols
Further Reading
Review Questions
Specific Challenges and Solutions
SPINS: Security Protocols for Sensor Networks
Quarantine Region Scheme for Spam Attacks
Secure Charging and Rewarding Scheme
Secure Node Localization
Secure Time Synchronization
Secure Event and Event Boundary Detection
Review Questions
Information Operations and Electronic Warfare
Electronic Support
Electronic Attack
Electronic Protection
Review Questions
Standards
X.800 and RFC 2828
Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA)
References
Index
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program