did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470516775

Security in Wireless Ad Hoc and Sensor Networks

by ;
  • ISBN13:

    9780470516775

  • ISBN10:

    0470516771

  • Format: eBook
  • Copyright: 2008-12-01
  • Publisher: Wiley
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $130.00
We're Sorry.
No Options Available at This Time.

Summary

This book provides an in-depth guide to security in wireless ad hoc and sensor networksSecurity in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and counter measures in wireless ad hoc, sensor and mesh networks, and briefly presents the standards on related topics. The authors offer a clear exposition of various challenges and solutions in this field including bootstrapping, key distribution and exchange, authentication issues, privacy, anonymity and tamper resilience.Key Features:Introduces the fundamentals and key issues of the new technologies followed by comprehensive presentation on security attacks and counter measures Covers Denial of Service (DoS) attacks, hardware aspects of secure wireless ad hoc and sensor networks and secure routing Contains information on cryptographic primitives and electronic warfare Includes problems at the end of each chapter to enhance learning. Offers an accompanying website with extra learning resources including over 400 PowerPoint slides.This book is well suited for graduate students in computer, electrical and communications engineering and computer science departments, researchers in academia and industry, as well as C4I engineers and officers in the military. Wireless network designers for internet service providers and mobile communications operators will also find this book very useful.

Table of Contents

About the Authors
Preface
Acknowledgements
List of Acronyms
Wireless Ad Hoc, Sensor and Mesh Networking
Introduction
Information Security
Scope of the Book
Structure of the Book
Electronic Resources for the Book
Review Questions
Wireless Ad Hoc, Sensor and Mesh Networks
Ad Hoc Networks and Applications
Sensor and Actuator Networks
Mesh Networks
Tactical Communications and Networks
Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks
Review Questions
The Wireless Medium
Wireless Channel Fundamentals and Security
Advanced Radio Technologies
Review Questions
Medium Access and Error Control
Medium Access Control
Error Control
Wireless Metropolitan Area Networks
Wireless Local Area Networks
Wireless Personal Area Networks
Review Questions
Routing
Internet Protocol and Mobile IP
Routing in Wireless Ad Hoc Networks
Routing in Wireless Sensor and Actuator Networks
Review Questions
Reliability, Flow and Congestion Control
Reliability
Flow and Congestion Control
Review Questions
Other Challenges and Security Aspects
Localization and Positioning
Time Synchronization
Addressing
Data Aggregation and Fusion
Data Querying
Coverage
Mobility Management
Cross-layer Design
Review Questions
Security in Wireless Ad Hoc, Sensor and Mesh Networking
Security Attacks in Ad Hoc, Sensor and Mesh Networks
Security Attacks
Attackers
Security Goals
Review Questions
Cryptography
Symmetric Encryption
Asymmetric Encryption
Hash Functions and Message Authentication Code
Cascading Hashing
Review Questions
Challenges and Solutions: Basic Issues
Bootstrapping Security in Ad Hoc Networks
Bootstrapping Security in Sensor Networks
Key Distribution, Exchange and Management
Authentication Issues
Integrity
Review Questions
Challenges and Solutions: Protection
Privacy and Anonymity
Intrusion Detection
Defense Against Traffic Analysis
Access Control and Secure Human-Computer Interaction
Software-Based Anti-Tamper Techniques
Tamper Resilience: Hardware Protection
Availability and Plausibility
Review Questions
Secure Routing
Defense Against Security Attacks in Ad Hoc Routing
Secure Ad Hoc Routing Protocols
Further Reading
Review Questions
Specific Challenges and Solutions
SPINS: Security Protocols for Sensor Networks
Quarantine Region Scheme for Spam Attacks
Secure Charging and Rewarding Scheme
Secure Node Localization
Secure Time Synchronization
Secure Event and Event Boundary Detection
Review Questions
Information Operations and Electronic Warfare
Electronic Support
Electronic Attack
Electronic Protection
Review Questions
Standards
X.800 and RFC 2828
Wired Equivalent Privacy (WEP
Wi-Fi Protected Access (WPA
References
Index
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program