|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocn680038492 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
101109s2011 flua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d YDXCP
|d EBLCP
|d E7B
|d OCLCQ
|d UIU
|d B24X7
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d IL4J6
|d STF
|d VRC
|d CRCPR
|d UA@
|d WAU
|d OCLCQ
|d PIFBY
|d OTZ
|d LIV
|d UAB
|d OCLCQ
|d MERUC
|d ERL
|d OCLCQ
|d CEF
|d INT
|d AU@
|d COO
|d OCLCQ
|d UKMGB
|d WYU
|d UWO
|d S9I
|d YDX
|d TYFRS
|d OCLCQ
|d LEAUB
|d OCLCQ
|d BRF
|d OCLCQ
|d OCLCO
|d UKAHL
|d OCLCQ
|d SFB
|d OCLCQ
|d OCLCL
|
016 |
7 |
|
|a 018389822
|2 Uk
|
019 |
|
|
|a 712995245
|a 741261077
|a 1067228451
|a 1110604956
|
020 |
|
|
|a 9781439819203
|q (electronic bk.)
|
020 |
|
|
|a 1439819203
|q (electronic bk.)
|
020 |
|
|
|a 9781466547766
|
020 |
|
|
|a 1466547766
|
020 |
|
|
|a 9780429094392
|q (e-book ;
|q PDF)
|
020 |
|
|
|a 0429094396
|
020 |
|
|
|z 9781439819197
|
020 |
|
|
|z 143981919X
|
024 |
7 |
|
|a 10.1201/EBK1439819197
|2 doi
|
029 |
1 |
|
|a AU@
|b 000048596157
|
029 |
1 |
|
|a AU@
|b 000059708690
|
029 |
1 |
|
|a DEBSZ
|b 372797636
|
029 |
1 |
|
|a DEBSZ
|b 430899424
|
029 |
1 |
|
|a DEBSZ
|b 456471723
|
029 |
1 |
|
|a NZ1
|b 13761390
|
029 |
1 |
|
|a UKMGB
|b 018389822
|
035 |
|
|
|a (OCoLC)680038492
|z (OCoLC)712995245
|z (OCoLC)741261077
|z (OCoLC)1067228451
|z (OCoLC)1110604956
|
037 |
|
|
|a TANDF_210207
|b Ingram Content Group
|
050 |
|
4 |
|a TK5105.77
|b .S43 2011eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Security of self-organizing networks :
|b MANET, WSN, WMN, VANET /
|c edited by Al-Sakib Khan Pathan.
|
260 |
|
|
|a Boca Raton :
|b Auerbach Pub.,
|c ©2011.
|
300 |
|
|
|a 1 online resource (xviii, 620 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
0 |
|g Machine generated contents note:
|g pt. I
|t GENERAL TOPICS: SECURITY OF WIRELESS AND SELF-ORGANIZING NETWORKS --
|g 1.
|t Secure Device Association: Trends and Issues /
|r Ian Wakeman --
|g 1.1.
|t Introduction --
|g 1.2.
|t Background --
|g 1.2.1.
|t Attack Types in Device Association Model --
|g 1.2.1.1.
|t Eavesdropping --
|g 1.2.1.2.
|t MiTM Attack --
|g 1.2.1.3.
|t DoS Attack --
|g 1.2.1.4.
|t Bidding-Down Attack --
|g 1.2.1.5.
|t Compromised Devices --
|g 1.2.2.
|t Device Association in Ad Hoc Environments --
|g 1.2.2.1.
|t Resurrecting Duckling Security Model --
|g 1.2.2.2.
|t Talking to Strangers --
|g 1.2.2.3.
|t Device Association Using Visual Out-of-Band Channels --
|g 1.2.2.4.
|t Device Association Using Audio Out-of-Band Channels --
|g 1.2.2.5.
|t Device Association Using Accelerometers --
|g 1.2.2.6.
|t Device Association Using Radio Signals --
|g 1.2.2.7.
|t Device Association Using Biometric Data --
|g 1.2.2.8.
|t Button-Enabled Device Association (BEDA) --
|g 1.2.2.9.
|t Bluetooth Pairing --
|g 1.2.2.10.
|t Device Association Using Near-Field Communication Technology --
|g 1.2.2.11.
|t Wireless Universal Serial Bus (WUSB) Association, WPS, and Windows Connect now-Net --
|g 1.2.3.
|t Comparative Analysis of Device Association Methods --
|g 1.3.
|t Future Directions for Research --
|g 1.4.
|t Conclusions --
|t Acknowledgments --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g 2.
|t Securing Route and Path Integrity in Multihop Wireless Networks /
|r Vallipuram Muthukkumarasamy --
|g 2.1.
|t Introduction --
|g 2.1.1.
|t IEEE 802.11 and IEEE 802.11s --
|g 2.1.2.
|t Implementation Support --
|g 2.2.
|t Background --
|g 2.2.1.
|t Routing Protocols --
|g 2.2.1.1.
|t Proactive Routing Protocols --
|g 2.2.1.2.
|t Reactive Routing Protocols --
|g 2.2.2.
|t Path-Selection Protocols --
|g 2.3.
|t Securing Routing and Path Selection --
|g 2.3.1.
|t Threat Model --
|g 2.3.1.1.
|t Threats Posed by Outsider Attacks --
|g 2.3.1.2.
|t Threats Posed by Compromised Nodes --
|g 2.3.2.
|t Attacks against Routing and Path Selection --
|g 2.3.2.1.
|t Rushing Attacks --
|g 2.3.2.2.
|t Gray Holes and Black Holes --
|g 2.3.2.3.
|t Wormholes --
|g 2.3.3.
|t Defenses --
|g 2.3.3.1.
|t Authenticated Routing --
|g 2.3.3.2.
|t Pathrater/Watchdog --
|g 2.3.3.3.
|t Packet Leashes --
|g 2.4.
|t Future Directions for Research --
|g 2.4.1.
|t Secure MAC Protocols --
|g 2.4.2.
|t Distance-Bounding Protocols --
|g 2.4.3.
|t Secure Neighbor Discovery --
|g 2.5.
|t Conclusions --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g 3.
|t Handling Security Threats to the RFID System of EPC Networks /
|r Evangelos Kranakis --
|g 3.1.
|t Introduction --
|g 3.1.1.
|t Background --
|g 3.2.
|t Threat Analysis Methodology --
|g 3.3.
|t Evaluation of Threats --
|g 3.3.1.
|t Authenticity Threats --
|g 3.3.2.
|t Integrity and Availability Threats --
|g 3.4.
|t Survey of RFID Security Defences --
|g 3.4.1.
|t Hardware-Based Primitives --
|g 3.4.2.
|t Software Protocols --
|g 3.5.
|t Future Directions for Research --
|g 3.6.
|t Conclusions --
|t Acknowledgments --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g 4.
|t Survey of Anomaly Detection Algorithms: Toward Self-Learning Networks /
|r Rumana Rahman --
|g 4.1.
|t Introduction --
|g 4.2.
|t Background --
|g 4.3.
|t Future Directions for Research: Adaptive, Online Algorithms --
|g 4.3.1.
|t Foundations --
|g 4.3.2.
|t LS Estimation Techniques --
|g 4.3.2.1.
|t Algorithms Using Updating of the Covariance Matrix --
|g 4.3.2.2.
|t Algorithms Using Orthogonal Transformations --
|g 4.3.2.3.
|t Algorithms Using Updating of the Information Matrix --
|g 4.3.2.4.
|t Algorithms Using Updating and Downdating of the QR Decompositions --
|g 4.3.2.5.
|t Error Analysis --
|g 4.3.2.6.
|t Time-Varying Parameter Estimation --
|g 4.3.2.7.
|t Applications --
|g 4.3.3.
|t Kernel Versions of LS Techniques --
|g 4.3.4.
|t Adaptive, Online Algorithms Based on LS Techniques --
|g 4.3.5.
|t Other Online and Adaptive Algorithms --
|g 4.4.
|t Conclusions --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g 5.
|t Reputation- and Trust-Based Systems for Wireless Self-Organizing Networks /
|r Jaydip Sen --
|g 5.1.
|t Introduction --
|g 5.2.
|t Trust-Definition and Concepts --
|g 5.3.
|t Trust in Wireless Self-Organizing Networks --
|g 5.3.1.
|t Wireless Self-Organizing Networks --
|g 5.3.2.
|t Misbehavior of Nodes --
|g 5.3.3.
|t Effects of Nodes' Misbehavior --
|g 5.4.
|t Reputation- and Trust-Based Systems --
|g 5.4.1.
|t Trust and its Characteristics --
|g 5.4.2.
|t Reputation Systems: Goals and Properties --
|g 5.4.3.
|t Classification of Reputation- and Trust-Based Systems --
|g 5.5.
|t Issues in Reputation Systems for Wireless Communication Networks --
|g 5.5.1.
|t Information Gathering --
|g 5.5.2.
|t Information Dissemination --
|g 5.5.3.
|t Redemption and Weighting of Time --
|g 5.5.4.
|t Weighting of Second-Hand Information --
|g 5.5.5.
|t Spurious Ratings --
|g 5.5.6.
|t Identity --
|g 5.5.7.
|t Detection --
|g 5.5.8.
|t Response --
|g 5.6.
|t Examples of Reputation and Trust-based Models --
|g 5.6.1.
|t Watchdog and Pathrater --
|g 5.6.2.
|t Context-Aware Inference Mechanism --
|g 5.6.3.
|t Trust-Based Relationship of Nodes in Ad Hoc Networks --
|g 5.6.4.
|t Trust Aggregation Scheme --
|g 5.6.5.
|t Trust Management in Ad Hoc Networks --
|g 5.6.6.
|t Trusted Routing Schemes --
|g 5.6.7.
|t Collaborative Reputation Mechanism in Mobile Ad Hoc Networks --
|g 5.6.8.
|t Cooperation of Nodes-Fairness in Dynamic Ad Hoc Networks --
|g 5.6.9.
|t Observation-Based Cooperation Enhancement in Ad Hoc Networks --
|g 5.6.10.
|t Robust Reputation System --
|g 5.6.11.
|t Reputation-Based Framework for High-Integrity Sensor Networks --
|g 5.6.12.
|t Distributed Reputation-Based Beacon Trust System --
|g 5.7.
|t Open Problems --
|g 5.8.
|t Conclusion --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g pt. II
|t MOBILE AD HOC NETWORK AND VEHICULAR AD HOC NETWORK SECURITY --
|g 6.
|t Security Threats in Mobile Ad Hoc Networks /
|r Juan E.
|
505 |
0 |
0 |
|t Tapiador --
|g 6.1.
|t Introduction --
|g 6.2.
|t Background --
|g 6.2.1.
|t Vulnerabilities of Manets --
|g 6.2.2.
|t AODV Routing Protocol --
|g 6.3.
|t Attacks on MANET --
|g 6.3.1.
|t Adversary Model --
|g 6.3.2.
|t Attacks --
|g 6.3.2.1.
|t Passive Attacks --
|g 6.3.2.2.
|t Active Attacks --
|g 6.4.
|t Countermeasures --
|g 6.4.1.
|t Prevention Techniques: Secure Routing --
|g 6.4.2.
|t Intrusion Detection --
|g 6.4.2.1.
|t Specification-Based Intrusion Detection --
|g 6.4.2.2.
|t Anomaly-Based Intrusion Detection --
|g 6.4.2.3.
|t Misuse-Based Intrusion Detection --
|g 6.4.2.4.
|t Promiscuous Monitoring-Based Intrusion Detection --
|g 6.5.
|t Future Directions for Research --
|g 6.6.
|t Conclusions --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g 7.
|t Key Management in Mobile Ad Hoc Networks /
|r Sumit Goswami --
|g 7.1.
|t Introduction --
|g 7.1.1.
|t MANET: Introduction and Application --
|g 7.1.2.
|t Ad Hoc Network Security --
|g 7.1.3.
|t Key Management --
|g 7.2.
|t Background --
|g 7.2.1.
|t Security Issues in Wired versus Ad Hoc Network --
|g 7.2.2.
|t Design Issues --
|g 7.2.3.
|t Key Management Challenges --
|g 7.3.
|t Key Management in MANET --
|g 7.3.1.
|t Hierarchical Model --
|g 7.3.2.
|t Threshold Model --
|g 7.3.2.1.
|t Threshold Public Key Management with Partially Distributed Authority --
|g 7.3.2.2.
|t Distributed CA Based on Threshold Scheme --
|g 7.3.2.3.
|t Public Key Management Based on Identity Threshold --
|g 7.3.3.
|t Self-Organized Public Key Management --
|g 7.3.4.
|t Mobile Ad Hoc Key Revocation Server Scheme --
|g 7.3.4.1.
|t Discovery of MAKeRS in a ZoNA --
|g 7.3.4.2.
|t Message Format for Neighbor Discovery --
|g 7.3.4.3.
|t Server Discovery Algorithm --
|g 7.3.4.4.
|t Protocols --
|g 7.4.
|t Future Directions for Research --
|g 7.5.
|t Conclusions --
|t Questions and Sample Answers --
|g 8.
|t Combating against Security Attacks against Mobile Ad Hoc Networks (Manets) /
|r Marcus Scholler --
|g 8.1.
|t Introduction --
|g 8.2.
|t Background: Attack Taxonomy --
|g 8.3.
|t Network Layer Attacks against MANETs --
|g 8.3.1.
|t Wormhole Attack --
|g 8.3.1.1.
|t Countermeasures against the Wormhole Attack --
|g 8.3.2.
|t Blackhole Attack --
|g 8.3.2.1.
|t Countermeasures against the Blackhole Attack --
|g 8.3.3.
|t Byzantine Attack --
|g 8.3.3.1.
|t Byzantine Attack Prevention --
|g 8.3.4.
|t Rushing Attack --
|g 8.3.4.1.
|t Rushing Attack Solution --
|g 8.3.5.
|t Resource Consumption Attack --
|g 8.3.5.1.
|t Resource Consumption Attack Prevention --
|g 8.3.6.
|t Link Withholding and Link-Spoofing Attacks --
|g 8.3.7.
|t Replay Attacks --
|g 8.4.
|t Transport Layer Attacks against MANET --
|g 8.4.1.
|t SYN Flooding Attack --
|g 8.4.2.
|t Session Hijacking Attack --
|g 8.5.
|t Case Studies --
|g 8.5.1.
|t Collusion Attack against OLSR-Based MANETs --
|g 8.5.2.
|t Detecting Wormhole Attacks against OLSR Protocols --
|g 8.6.
|t Open Issues and Future Directions of Research --
|g 8.6.1.
|t Intrusion Detection and Prevention --
|g 8.6.2.
|t Cryptographic Techniques --
|g 8.6.3.
|t Resiliency --
|g 8.7.
|t Conclusions --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g 9.
|t Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks: A Survey /
|r Arobinda Gupta --
|g 9.1.
|t Introduction --
|g 9.2.
|t Attacks at the Physical Layer --
|g 9.3.
|t Attacks at the MAC Layer --
|g 9.3.1.
|t Selfish Misbehavior of Nodes --
|g 9.3.2.
|t Malicious Behavior of Nodes --
|g 9.3.3.
|t Other Classifications --
|g 9.3.3.1.
|t Internal versus External Attacks --
|g 9.3.3.2.
|t Active versus Passive Attacks --
|g 9.3.4.
|t Discussion and Analysis --
|g 9.4.
|t Attacks at the Network Layer --
|g 9.4.1.
|t Other Classifications --
|g 9.4.2.
|t Discussion and Analysis --
|g 9.5.
|t Attacks at the Transport Layer --
|g 9.6.
|t Attacks at the Application Layer --
|g 9.7.
|t Attacks on VANET --
|g 9.8.
|t Conclusion --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g 10.
|t Security in Vehicular Ad Hoc Networks /
|r Mozaffar Afaque --
|g 10.1.
|t Introduction --
|g 10.2.
|t Vehicular Networks: An Overview --
|g 10.3.
|t Background: Need for Security --
|g 10.3.1.
|t Security Requirements --
|g 10.3.2.
|t Challenges.
|
505 |
0 |
0 |
|g Note continued:
|g 10.3.3.
|t Adversaries --
|g 10.3.4.
|t Attacks --
|g 10.3.5.
|t VANET Properties Supporting Security --
|g 10.4.
|t Security in VANETs --
|g 10.5.
|t Central Authorities and Vehicular PKI --
|g 10.6.
|t Secure Computing Platform: Hardware and Software for a Secure VANET Node --
|g 10.7.
|t Implementing Message Authentication and Integrity Using Digital Signatures --
|g 10.8.
|t How is Privacy and Identity Management being Handled --
|g 10.9.
|t Certificate Revocation --
|g 10.10.
|t Secure Aggregation of Data --
|g 10.11.
|t Detection of Malicious Data and Secure Position Verification --
|g 10.12.
|t Future Directions for Research --
|g 10.13.
|t Conclusions --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g 11.
|t Toward a Robust Trust Model for Ensuring Security and Privacy in Vanets /
|r Syed Ishtiaque Ahmed --
|g 11.1.
|t Introduction --
|g 11.2.
|t Background/Related Works --
|g 11.3.
|t Trust Model for VANET Preliminaries --
|g 11.3.1.
|t Characteristics of Trust Models and its Metrics --
|g 11.3.2.
|t Objectives of VANETs --
|g 11.3.3.
|t Components and Key Characteristics of VANETs --
|g 11.3.4.
|t Adversary Model for VANETs --
|g 11.3.5.
|t Salient Features of Trust Metrics in Distributed Systems and VANETs --
|g 11.4.
|t State of the Art: Data Centric Trust Management Model --
|g 11.4.1.
|t Preliminaries --
|g 11.4.2.
|t Framework --
|g 11.4.3.
|t Dynamic Factors --
|g 11.4.4.
|t Decision Logic --
|g 11.4.4.1.
|t Majority Voting --
|g 11.4.4.2.
|t Most Trusted Report --
|g 11.4.4.3.
|t Weighted Voting --
|g 11.4.4.4.
|t Bayesian Inference --
|g 11.4.4.5.
|t Dempster-Shafer Theory --
|g 11.4.4.6.
|t Application of Decision Logic --
|g 11.5.
|t Challenges and Questions --
|g 11.6.
|t Future Directions --
|g 11.7.
|t Conclusion --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g 12.
|t Sybil Attack in Vanets: Detection and Prevention /
|r V. Laxmi --
|g 12.1.
|t Introduction --
|g 12.2.
|t VANET Architecture --
|g 12.3.
|t Attacks on Vehicular Networks --
|g 12.3.1.
|t Classification of Attackers --
|g 12.3.2.
|t Types of Attacks --
|g 12.3.3.
|t Security Requirements --
|g 12.4.
|t Sybil Attack --
|g 12.5.
|t Trust Establishment --
|g 12.5.1.
|t Infrastructure-Based Trust Establishment --
|g 12.5.2.
|t Dynamic Trust Establishment --
|g 12.5.2.1.
|t History-Based Trust Establishment --
|g 12.5.2.2.
|t Self-Certified Pseudonym-Based Trust Establishment --
|g 12.5.3.
|t Analysis of Trust Establishment Approaches --
|g 12.6.
|t Detection of Sybil Attack --
|g 12.6.1.
|t Resource Testing --
|g 12.6.2.
|t Public Key Cryptography --
|g 12.6.3.
|t Passive Detection through Single Observer --
|g 12.6.4.
|t Passive Detection through Multiple Observers --
|g 12.6.5.
|t Sybil Node Detection by Propagation Model --
|g 12.6.6.
|t Active Detection by Position Verification --
|g 12.6.7.
|t Sensor-Based Position Verification --
|g 12.6.8.
|t Analysis of Sybil Detection Solutions --
|g 12.7.
|t Future Directions for Research --
|g 12.8.
|t Conclusion --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g pt. III
|t WIRELESS SENSOR NETWORK SECURITY --
|g 13.
|t Key Management Schemes of Wireless Sensor Networks: A Survey /
|r Sungyoung Lee --
|g 13.1.
|t Introduction --
|g 13.2.
|t Background --
|g 13.3.
|t Security Threats in Wireless Sensor Networks --
|g 13.4.
|t Key Management --
|g 13.5.
|t Future Directions of Research --
|g 13.6.
|t Conclusions --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g 14.
|t Key Management Techniques for Wireless Sensor Networks: Practical and Theoretical Considerations /
|r Yannis C. Stamatiou --
|g 14.1.
|t Introduction and Background --
|g 14.1.1.
|t Single Network-Wide Key --
|g 14.1.2.
|t Pairwise Key Establishment Scheme --
|g 14.1.3.
|t Random Key Predistribution --
|g 14.1.3.1.
|t Basic Scheme --
|g 14.1.3.2.
|t q-Composite Random Key Predistribution Scheme --
|g 14.1.4.
|t Deterministic Key Distribution --
|g 14.1.5.
|t Combinatorial Key Predistribution --
|g 14.1.5.1.
|t Set-Based Constructions for Key Predistribution --
|g 14.1.5.2.
|t Constructions Based on Hadamard Matrices --
|g 14.2.
|t Advanced Concepts for Key Management and Trust in WSNs --
|g 14.2.1.
|t Random Graph Models --
|g 14.2.2.
|t Randomized Scheme Based on the Fixed Radius Model --
|g 14.2.2.1.
|t Random Points in Euclidean Spaces --
|g 14.2.2.2.
|t Key Predistribution Scheme Based on Random Points on Circular Disks --
|g 14.2.3.
|t First-Order Language of Graphs --
|g 14.2.4.
|t Second-Order Language of Graphs --
|g 14.2.5.
|t Undecidable Probabilities --
|g 14.2.6.
|t Set Systems Based on Special Polynomials --
|g 14.2.6.1.
|t Some Definitions --
|g 14.2.6.2.
|t BBR Polynomials --
|g 14.3.
|t Conclusions --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g 15.
|t Bio-Inspired Intrusion Detection for Wireless Sensor Networks /
|r Fatma Mili --
|g 15.1.
|t Introduction --
|g 15.1.1.
|t Security Robustness Characteristics of Sensor Networks --
|g 15.1.2.
|t Security Vulnerability Characteristics of Sensor Networks --
|g 15.2.
|t Background --
|g 15.2.1.
|t Types of DoS Attacks that an IDS Must Deter --
|g 15.2.2.
|t Elements of a DoS Intruder Detection System --
|g 15.2.3.
|t Approaches to DoS Intruder Detection --
|g 15.2.3.1.
|t IDS Based on Deviation from Normal --
|g 15.2.3.2.
|t Selective Forwarding Attack Detection Scheme --
|g 15.2.4.
|t Summary Anomaly-Based IDS Systems for WSNs --
|g 15.3.
|t Natural and Artificial Immune Systems, General Principles --
|g 15.3.1.
|t Natural Immune Systems --
|g 15.3.2.
|t Artificial Immune Systems --
|g 15.4.
|t Representative Sample of AIS for Sensor Networks --
|g 15.4.1.
|t Sample Implementation of the Innate Immune System --
|g 15.4.1.1.
|t Background --
|g 15.4.1.2.
|t Immunity Layer Simulated --
|g 15.4.1.3.
|t Characterization of Intruders (Self vs. Non-self) --
|g 15.4.1.4.
|t Identifying Intruders and Ensuing Processes --
|g 15.4.1.5.
|t General Assessment and Simulation Results --
|g 15.4.2.
|t Example Implementation of an Adaptive Immune System: Immunity-Based Intrusion Detection for WSNs --
|g 15.4.2.1.
|t Background, Motivation --
|g 15.4.2.2.
|t Immunity Layer Simulated --
|g 15.4.2.3.
|t Characterization of Intruders (Self vs. Non-self) --
|g 15.4.2.4.
|t Identifying Intruders and Ensuing Processes --
|g 15.4.2.5.
|t General Assessment and Simulation Results --
|g 15.4.3.
|t Example Implementation of Danger Theory: An Artificial Immune System Approach with Secondary Response --
|g 15.4.3.1.
|t Background, Motivation --
|g 15.4.3.2.
|t Layer Simulated --
|g 15.4.3.3.
|t Characterization of Intruders (Self vs. Non-self) --
|g 15.4.3.4.
|t Identification of Intruders --
|g 15.4.3.5.
|t Assessment and Simulation Results --
|g 15.4.4.
|t Adaptive Immunity for WSNs --
|g 15.4.4.1.
|t Motivation --
|g 15.4.4.2.
|t Determining "Self" --
|g 15.4.4.3.
|t Simulation Examples --
|g 15.5.
|t Future Directions for Research --
|g 15.6.
|t Conclusions --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g 16.
|t Biological Inspired Autonomously Secure Mechanism for Wireless Sensor Networks /
|r Rozeha A.
|
505 |
0 |
0 |
|t Rashid --
|g 16.1.
|t Introduction --
|g 16.1.1.
|t IEEE 802.15.4 --
|g 16.1.2.
|t Types of Applications --
|g 16.1.3.
|t Resource Constraint --
|g 16.1.4.
|t Self-Organization --
|g 16.1.5.
|t Objectives --
|g 16.1.6.
|t Organization of the Chapter --
|g 16.2.
|t Background and Related Research --
|g 16.2.1.
|t Overview of Ant Routing in WSNs --
|g 16.2.2.
|t Comparison of the Most Recent ANT-Based Routing in WSNs --
|g 16.2.3.
|t Security in WSNs --
|g 16.2.3.1.
|t Spoofed, Altered, or Replayed Routing Information --
|g 16.2.3.2.
|t Selective Forwarding --
|g 16.2.3.3.
|t Sinkhole Attacks --
|g 16.2.3.4.
|t Sybil Attacks --
|g 16.2.3.5.
|t Wormholes --
|g 16.2.3.6.
|t HELLO Flood Attack --
|g 16.2.3.7.
|t Acknowledgment Spoofing --
|g 16.2.4.
|t Overview of IDS-Based Security --
|g 16.2.5.
|t Overview of AIS-Based Security --
|g 16.2.6.
|t Overview of Keying-Based Security --
|g 16.2.7.
|t Comparison of the Most Common Secure Routing Protocols in WSNs --
|g 16.3.
|t Methodology --
|g 16.3.1.
|t System Design --
|g 16.3.2.
|t Routing Management --
|g 16.3.3.
|t Neighbor Management --
|g 16.3.4.
|t Power Management --
|g 16.3.5.
|t Forwarding Criteria --
|g 16.3.6.
|t Optimal Route Discovery --
|g 16.3.7.
|t Determination of Packet Velocity --
|g 16.3.8.
|t Determination of Link Quality --
|g 16.3.9.
|t Security Management --
|g 16.4.
|t Simulation --
|g 16.4.1.
|t Simulation Tools --
|g 16.4.2.
|t Graphical Animation of the Network --
|g 16.4.3.
|t Network Model and Performance Parameters --
|g 16.5.
|t Results --
|g 16.5.1.
|t Performance Analysis --
|g 16.6.
|t Future Directions for Research --
|g 16.7.
|t Conclusion --
|t Acknowledgment --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g 17.
|t Controlled Link Establishment Attack on Key Pre-Distribution Schemes for Distributed Sensor Networks and Countermeasures /
|r Johnson I. Agbinya --
|g 17.1.
|t Introduction --
|g 17.2.
|t Background on PKPSs for DSNs --
|g 17.2.1.
|t Mathematical Model --
|g 17.2.2.
|t Expected Properties of PKPSs --
|g 17.2.3.
|t State-of-the-Art of PKPSs --
|g 17.3.
|t Controlled Link Establishment Attack --
|g 17.3.1.
|t Node Replication Attack --
|g 17.3.2.
|t Key-Swapping Collusion Attack --
|g 17.3.2.1.
|t Short-Distance Collusion Attack --
|g 17.3.2.2.
|t Long-Distance Collusion Attack --
|g 17.3.2.3.
|t Mixed-Distance Collusion Attack --
|g 17.4.
|t Countermeasures --
|g 17.4.1.
|t Indirect Countermeasures --
|g 17.4.2.
|t Direct Countermeasures --
|g 17.4.2.1.
|t Witness-Based Detection Schemes --
|g 17.4.2.2.
|t SET: Set Operation-Based Detection Scheme --
|g 17.4.2.3.
|t Bloom Filter-Based Detection Scheme --
|g 17.4.2.4.
|t One-Way Hash Chain-Based Protection Schemes --
|g 17.5.
|t Future Research Directions --
|g 17.6.
|t Conclusions --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g 18.
|t Proactive Key Variation Owing to Dynamic Clustering (Periodic) in Sensor Networks /
|r Gihwan Cho --
|g 18.1.
|t Introduction --
|g 18.2.
|t Background --
|g 18.2.1.
|t Nonrenewal Schemes --
|g 18.2.2.
|t Reactive Renewal Schemes --
|g 18.2.3.
|t Secure CH Election Schemes.
|
505 |
0 |
0 |
|g Note continued:
|g 18.3.
|t Network and Threat Model --
|g 18.3.1.
|t Network Model --
|g 18.3.2.
|t Threat Model --
|g 18.4.
|t Proactive Key Variation Owing to Dynamic Clustering Scheme --
|g 18.4.1.
|t Sector Formation --
|g 18.4.2.
|t Pairwise Key Establishments within Sectors --
|g 18.4.3.
|t Secure CH Election --
|g 18.4.3.1.
|t Commitment Broadcast --
|g 18.4.3.2.
|t Broadcast of Fulfillment Value --
|g 18.4.3.3.
|t Sum Generation and CH Election --
|g 18.4.3.4.
|t Adjustment of Broadcast Order --
|g 18.4.4.
|t Transmission of Sensed Data --
|g 18.5.
|t Evaluation --
|g 18.5.1.
|t Security Evaluation --
|g 18.5.2.
|t Efficiency Evaluation --
|g 18.6.
|t Synchronization and Scalability --
|g 18.7.
|t Future Directions for Research --
|g 18.8.
|t Conclusions --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g 19.
|t Secure Routing Architectures Using Cross-Layer Information for Attack Avoidance (with Case Study on Wormhole Attacks) /
|r David Pearce --
|g 19.1.
|t Introduction --
|g 19.1.1.
|t Overview of Sensor Networks --
|g 19.1.2.
|t Overview of Sensor Network Security Issues --
|g 19.1.3.
|t Techniques for Defending WSN Systems --
|g 19.1.4.
|t Wormhole Attack --
|g 19.1.4.1.
|t Wormhole Attack Classifications --
|g 19.1.4.2.
|t Response to Wormhole Attacks --
|g 19.1.5.
|t Chapter Overview --
|g 19.2.
|t Background --
|g 19.2.1.
|t Background Overview --
|g 19.2.2.
|t Packet Leashing Approaches --
|g 19.2.3.
|t Approaches Involving Additional Hardware --
|g 19.2.4.
|t Sink-Based Approaches --
|g 19.2.5.
|t Graph-Theory Approaches --
|g 19.2.6.
|t Spectral Monitoring Approaches --
|g 19.2.7.
|t Unexpected Security Benefits from Wormholes --
|g 19.3.
|t Current Research Progress --
|g 19.3.1.
|t Introduction to Current Research --
|g 19.3.2.
|t Philosophy Behind Disturbance --
|g 19.3.2.1.
|t Passive Wormholes and Static Disturbance --
|g 19.3.2.2.
|t Dynamic Disturbance for Detection --
|g 19.3.3.
|t Metric Definition --
|g 19.3.3.1.
|t Static Metric Definition --
|g 19.3.3.2.
|t Dynamic Metric Definition --
|g 19.3.4.
|t Protocol Logic and Implementation --
|g 19.3.5.
|t Scenario Description --
|g 19.3.5.1.
|t Scenario Introduction --
|g 19.3.5.2.
|t Mobility Parameters --
|g 19.3.5.3.
|t Geometry Parameters for Deployment Region --
|g 19.3.5.4.
|t Wormhole Placement Parameters --
|g 19.3.5.5.
|t Simulation Logic --
|g 19.3.5.6.
|t Success Metric Tracked by a Simulator --
|g 19.3.6.
|t Results --
|g 19.3.6.1.
|t Varying the Static Routing Exponents --
|g 19.3.6.2.
|t Using Static Disturbance in Topologies of Varying Regularity --
|g 19.3.6.3.
|t Relative Performance of Static and Dynamic Disturbance --
|g 19.3.7.
|t Customizing Metrics for Known Topologies --
|g 19.3.8.
|t Future Directions for Research --
|g 19.3.8.1.
|t Overview of Future Directions --
|g 19.3.8.2.
|t Application to the Sinkhole Attack --
|g 19.4.
|t Conclusions --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g 20.
|t Reputation-Based Trust Systems in Wireless Sensor Networks /
|r Hani Alzaid --
|g 20.1.
|t Introduction --
|g 20.2.
|t Security Concerns --
|g 20.2.1.
|t WSN Attacks --
|g 20.2.2.
|t Reputation Attacks --
|g 20.3.
|t Analysis Framework for Reputation Systems --
|g 20.3.1.
|t Information Gathering and Sharing --
|g 20.3.2.
|t Information Modeling --
|g 20.3.3.
|t Decision Making and Dissemination --
|g 20.4.
|t State-of-the-Art of Reputation-Based Trust Systems in WSNs --
|g 20.4.1.
|t Trust-Based Security System for Ubiquitous and Pervasive Computing Environments --
|g 20.4.2.
|t Reputation-Based Secure Data Aggregation in WSNs --
|g 20.4.3.
|t Trust Management Problem in Distributed WSNs --
|g 20.4.4.
|t Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks --
|g 20.4.5.
|t Performance Analysis of the Confidant Protocol --
|g 20.4.6.
|t Distributed Reputation-Based Beacon Trust --
|g 20.4.7.
|t Reputation-Based Framework for High Integrity Sensor Networks --
|g 20.4.8.
|t Trust-Based Security for Wireless Ad Hoc and Sensor Networks --
|g 20.4.9.
|t Formal Reputation System for Trusting WSNs --
|g 20.5.
|t Comparison of Current Reputation-Based Systems in WSNs --
|g 20.5.1.
|t Classification Model --
|g 20.5.2.
|t Reputation Components Visibility --
|g 20.5.3.
|t Attack Visibility --
|g 20.6.
|t Conclusion --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g 21.
|t Major Works on the Necessity and Implementations of PKC in WSNs: A Beginner's Note /
|r Al-Sakib Khan Pathan --
|g 21.1.
|t Introduction --
|g 21.2.
|t PKC in WSNs --
|g 21.3.
|t Major Challenges to Implementing PKC in WSNs --
|g 21.3.1.
|t Survey on the Notable Implementations of PKC in WSNs --
|g 21.3.1.1.
|t Types of Implementations --
|g 21.3.1.2.
|t Software Implementations --
|g 21.3.1.3.
|t Hardware Implementations --
|g 21.3.1.4.
|t Hardware/Software-Blended Implementations --
|g 21.3.2.
|t Summary of Implementations --
|g 21.4.
|t Conclusions and Future Expectations --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g pt. IV
|t WIRELESS MESH NETWORK SECURITY --
|g 22.
|t Secure Access Control and Authentication in Wireless Mesh Networks /
|r Ranga Reddy --
|g 22.1.
|t Introduction --
|g 22.2.
|t Background --
|g 22.2.1.
|t Wireless Mesh Network --
|g 22.2.2.
|t Authentication Schemes in WLANs --
|g 22.2.2.1.
|t IEEE 802.1X Authentication --
|g 22.2.2.2.
|t IEEE 802.1X Limitations --
|g 22.3.
|t Access Control and Authentication in WMN --
|g 22.3.1.
|t Authentication-Related Security Attacks --
|g 22.3.2.
|t Secure Authentication Assumptions --
|g 22.3.3.
|t Requirements for Authentication in WMNs --
|g 22.3.3.1.
|t Security Requirements --
|g 22.3.3.2.
|t Performance Requirements --
|g 22.4.
|t Access Control and Authentication Schemes --
|g 22.4.1.
|t Localized Authentication Based on Public Certificate --
|g 22.4.2.
|t Predictive Authentication and Preauthentication --
|g 22.4.3.
|t EAP-based Authentication Schemes for WMNs --
|g 22.4.4.
|t Identity-Based Cryptography-Based Authentication --
|g 22.4.4.1.
|t Identity-Based Cryptography --
|g 22.4.4.2.
|t ID-Based Authentication in WMNs --
|g 22.5.
|t Future Directions for Research --
|g 22.6.
|t Conclusions --
|t Terminologies --
|t Questions and Sample Answers --
|t Author's Biography --
|t References --
|g 23.
|t Misbehavior Detection in Wireless Mesh Networks /
|r Md. Shariful Islam.
|
520 |
|
|
|a Reflecting recent advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and often-used terms to set the foundation for the following chapters. Examining critical security issues in a range of wireless networks, the book proposes specific solutions to security threats. Ideal for those with a basic understanding of network security, the text provides a clear examination of the key aspects of security in self-organizing networks and othe.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Ad hoc networks (Computer networks)
|x Security measures.
|
650 |
|
0 |
|a Self-organizing systems
|x Security measures.
|
650 |
|
6 |
|a Réseaux ad hoc (Réseaux d'ordinateurs)
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Systèmes auto-organisés
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
700 |
1 |
|
|a Pathan, Al-Sakib Khan.
|
758 |
|
|
|i has work:
|a Security of self-organizing networks (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCH8V8CYtPKjrTbQjk6d683
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|t Security of self-organizing networks.
|d Boca Raton : Auerbach Pub., ©2011
|z 9781439819197
|w (DLC) 2010028807
|w (OCoLC)656158701
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=599718
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24132594
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00036989
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL599718
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10424669
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 342382
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n AUP0KE10902PDF
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n 9780429094392
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15917216
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3347544
|
994 |
|
|
|a 92
|b IZTAP
|