书名:Security for multihop wireless networks
责任者:Shafiullah Khan and Jaime Lloret Mauri. | Lloret Mauri, Jaime.
ISBN\ISSN:9781466578036,1466578033
出版时间:2014
出版社:CRC Press, Taylor & Francis Group,
摘要
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.
Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer.
The text explains how to deal with black hole attacks in mobile ad hoc networks and describes how to detect misbehaving nodes in vehicular ad hoc networks. It identifies a pragmatic and energy efficient security layer for wireless sensor networks and covers the taxonomy of security protocols for wireless sensor communications.
Exploring recent trends in the research and development of multihop network security, the book outlines possible defenses against packet-dropping attacks in wireless multihop ad hoc networks.Complete with expectations for the future in related areas, this is an ideal reference for researchers, industry professionals, and academics. Its comprehensive coverage also makes it suitable for use as a textbook in graduate-level electrical engineering programs.
查看更多
前言
First of all, we would like to express our gratitude to the publisher Taylor & Francis for giving us full support in the timely completion of this book. We also thank all the authors for their chapter contributions to this book, including those whose manuscripts we were not able to include due to the rigorous review-based selection process. The authors of the accepted chapters come from many parts of the world, including Algeria, Australia, Canada, China, Colombia, France, Germany, India, Italy, Malaysia, New Zealand, Nigeria, Singapore, Spain, and the United States.
It is well understood nowadays that wireless networks have become a part of our daily technical life. Though the impact of wireless networking was more or less assessed since the advent of basic wireless technologies, today's vast and dynamic features of various wireless applications might not have been accurately envisaged. Today, the types of wireless networks range from cellular networks to ad hoc networks, infrastructure-based networks to infrastructure-less networks, short-range networks to long-range direct communication wireless networks, static wireless networks to mobile networks, and so on. Hence, while initiating this book project, choosing a plain title seemed to be a challenge but it also allowed different topics on wireless security to be compiled in a single volume.
This book is mainly targeted at researchers, postgraduate students in universities, academics, and industry practitioners or professionals. Elementary information about wireless security is not a priority of this book. Hence, some chapters include detailed research works and results on wireless network security. The book provides a broad coverage of wireless security issues.
The contributions identify various vulnerabilities in the physical layer, MAC layer, network layer, transport layer, and application layer, and focus on ways of strengthening security mechanisms and services throughout the layers. Instead of simply including chapters like a regular textbook, we have mainly focused on research-based outcomes. Hence, while addressing all the relevant issues and works in various layers, we basically lined up the chapters from easy-to-read survey-type articles to detailed investigation-related works.
Owing to the nature of research works, some of the concepts and future vision may not seem to be fully practical considering the state of the art. Still, to capture a snapshot of the current status, past gains, and future possibilities in the field of wireless network security, the book should be a good and timely collection. It could also be used as reference material as all the chapters include citations to the latest research trends and findings.
The book is divided into three sections:
Section I focuses on security issues and solutions in mobile ad hoc networks;
Section II presents a detailed overview of security challenges in wireless sensor networks; and
Section III is about security mechanisms in other networks.
Shafiullah Khan
Institute of Information Technology (IIT)
Kohat University of Science and Technology (KUST)
Kohat City, K.P.K, Pakistan
skhan@kust.edu.pk
Jaime Lloret Mauri
Integrated Management Coastal Research Institute Polytechnic University of Valencia
Valencia, Spain
jlloret@dcom.upv.es
查看更多
目录
Preface ix
Contributors xi
Section I Security in Mobile Ad Hoc Networks
1 Taxonomy and Holistic Detection of Security Attacks in MANETs 3
P. García-Teodoro, L. Sánchez-Casado,and G. Maciá-Fernández
2 Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks 19
Mohamed Amine Ferrag, Mehdi Nafa, and Salim Ghanemi
3 Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks 43
A. S. Khan, N. Fisal, M. Esa, S. Kamilah, Suleiman Zubair,W. Maqbool, and Z. Abu Bakar
4 Fighting against Black Hole Attacks in Mobile Ad Hoc Networks 73
Manuel D. Serrat-Olmos, Enrique Hernández-Orallo,Juan-Carlos Cano, Carlos T. Calafate,and Pietro Manzoni
5 Mutual Authentication in IP Mobility-Enabled Multihop Wireless Networks 101
Sanaa Taha, Sandra Céspedes, and Xuemin (Sherman) Shen
6 Detection of Misbehaving Nodes in Vehicular Ad Hoc Network 125
Rajesh P. Barnwal and Soumya K. Ghos
Section II Security in Wireless Sensor Networks
7 Security Architecture for Multihop Wireless Sensor Networks 157
Ismail Mansour, Gerard Chalhoub, and Michel Misson
8 Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach 179
Dauda Ayanda
9 TinyKey: A Pragmatic and Energy Efficient Security Layer for Wireless Sensor Networks 223
Roberto Doriguzzi Corin, Giovanni Russello,and Elio Salvadori
10 Secure Multipurpose Wireless Sensor Networks 247
Daniel Jacobi, Marc Fischlin, and Alejandro Buchmann
11 Anomaly Detection in Wireless Sensor Networks: Challenges and Future Trends 273
Muhammad Usman, Vallipuram Muthukkumarasamy,Xin-Wen Wu, and Surraya Khanum
12 Taxonomy of Security Protocols for Wireless Sensor Communications 305
Jasone Astorga, Eduardo Jacob, Nerea Toledo,and Marivi Higuero
Section III Security in Other Ad Hoc Networks
13 Securing the Control of Euler–Lagrange Systems in Networked Environments with Model-Free Sliding Mode Control 353
Shuai Li, Yunpeng Wang, and Long Cheng
14 Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc Networks 377
L. Sánchez-Casado, R. Magán-Carrión, P. García-Teodoro,and J.E. Díaz-Verdejo
15 Security Issues in Machine-to-Machine Communication 401
Shuo Chen and Maode Ma
16 Authentication in Wireless Mesh Networks 419
Aymen Boudguiga and Maryline Laure
17 Wireless-Based Application-Layer Cross-Layer Design with Simultaneous Quality of Service and Security Support 447
Sasan Adibi
18 Security, Trust, and Privacy in Opportunistic Multihop Wireless Networks 477
M. Bala Krishna
Index 503
查看更多
馆藏单位
中科院文献情报中心