Cargando…

Security of self-organizing networks : MANET, WSN, WMN, VANET /

Reflecting recent advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and often-used terms to set the foundation for the following chapters. Examining critical security i...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Pathan, Al-Sakib Khan
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton : Auerbach Pub., ©2011.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn680038492
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 101109s2011 flua ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d EBLCP  |d E7B  |d OCLCQ  |d UIU  |d B24X7  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d IL4J6  |d STF  |d VRC  |d CRCPR  |d UA@  |d WAU  |d OCLCQ  |d PIFBY  |d OTZ  |d LIV  |d UAB  |d OCLCQ  |d MERUC  |d ERL  |d OCLCQ  |d CEF  |d INT  |d AU@  |d COO  |d OCLCQ  |d UKMGB  |d WYU  |d UWO  |d S9I  |d YDX  |d TYFRS  |d OCLCQ  |d LEAUB  |d OCLCQ  |d BRF  |d OCLCQ  |d OCLCO  |d UKAHL  |d OCLCQ  |d SFB  |d OCLCQ  |d OCLCL 
016 7 |a 018389822  |2 Uk 
019 |a 712995245  |a 741261077  |a 1067228451  |a 1110604956 
020 |a 9781439819203  |q (electronic bk.) 
020 |a 1439819203  |q (electronic bk.) 
020 |a 9781466547766 
020 |a 1466547766 
020 |a 9780429094392  |q (e-book ;  |q PDF) 
020 |a 0429094396 
020 |z 9781439819197 
020 |z 143981919X 
024 7 |a 10.1201/EBK1439819197  |2 doi 
029 1 |a AU@  |b 000048596157 
029 1 |a AU@  |b 000059708690 
029 1 |a DEBSZ  |b 372797636 
029 1 |a DEBSZ  |b 430899424 
029 1 |a DEBSZ  |b 456471723 
029 1 |a NZ1  |b 13761390 
029 1 |a UKMGB  |b 018389822 
035 |a (OCoLC)680038492  |z (OCoLC)712995245  |z (OCoLC)741261077  |z (OCoLC)1067228451  |z (OCoLC)1110604956 
037 |a TANDF_210207  |b Ingram Content Group 
050 4 |a TK5105.77  |b .S43 2011eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a Security of self-organizing networks :  |b MANET, WSN, WMN, VANET /  |c edited by Al-Sakib Khan Pathan. 
260 |a Boca Raton :  |b Auerbach Pub.,  |c ©2011. 
300 |a 1 online resource (xviii, 620 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 0 |g Machine generated contents note:  |g pt. I  |t GENERAL TOPICS: SECURITY OF WIRELESS AND SELF-ORGANIZING NETWORKS --  |g 1.  |t Secure Device Association: Trends and Issues /  |r Ian Wakeman --  |g 1.1.  |t Introduction --  |g 1.2.  |t Background --  |g 1.2.1.  |t Attack Types in Device Association Model --  |g 1.2.1.1.  |t Eavesdropping --  |g 1.2.1.2.  |t MiTM Attack --  |g 1.2.1.3.  |t DoS Attack --  |g 1.2.1.4.  |t Bidding-Down Attack --  |g 1.2.1.5.  |t Compromised Devices --  |g 1.2.2.  |t Device Association in Ad Hoc Environments --  |g 1.2.2.1.  |t Resurrecting Duckling Security Model --  |g 1.2.2.2.  |t Talking to Strangers --  |g 1.2.2.3.  |t Device Association Using Visual Out-of-Band Channels --  |g 1.2.2.4.  |t Device Association Using Audio Out-of-Band Channels --  |g 1.2.2.5.  |t Device Association Using Accelerometers --  |g 1.2.2.6.  |t Device Association Using Radio Signals --  |g 1.2.2.7.  |t Device Association Using Biometric Data --  |g 1.2.2.8.  |t Button-Enabled Device Association (BEDA) --  |g 1.2.2.9.  |t Bluetooth Pairing --  |g 1.2.2.10.  |t Device Association Using Near-Field Communication Technology --  |g 1.2.2.11.  |t Wireless Universal Serial Bus (WUSB) Association, WPS, and Windows Connect now-Net --  |g 1.2.3.  |t Comparative Analysis of Device Association Methods --  |g 1.3.  |t Future Directions for Research --  |g 1.4.  |t Conclusions --  |t Acknowledgments --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g 2.  |t Securing Route and Path Integrity in Multihop Wireless Networks /  |r Vallipuram Muthukkumarasamy --  |g 2.1.  |t Introduction --  |g 2.1.1.  |t IEEE 802.11 and IEEE 802.11s --  |g 2.1.2.  |t Implementation Support --  |g 2.2.  |t Background --  |g 2.2.1.  |t Routing Protocols --  |g 2.2.1.1.  |t Proactive Routing Protocols --  |g 2.2.1.2.  |t Reactive Routing Protocols --  |g 2.2.2.  |t Path-Selection Protocols --  |g 2.3.  |t Securing Routing and Path Selection --  |g 2.3.1.  |t Threat Model --  |g 2.3.1.1.  |t Threats Posed by Outsider Attacks --  |g 2.3.1.2.  |t Threats Posed by Compromised Nodes --  |g 2.3.2.  |t Attacks against Routing and Path Selection --  |g 2.3.2.1.  |t Rushing Attacks --  |g 2.3.2.2.  |t Gray Holes and Black Holes --  |g 2.3.2.3.  |t Wormholes --  |g 2.3.3.  |t Defenses --  |g 2.3.3.1.  |t Authenticated Routing --  |g 2.3.3.2.  |t Pathrater/Watchdog --  |g 2.3.3.3.  |t Packet Leashes --  |g 2.4.  |t Future Directions for Research --  |g 2.4.1.  |t Secure MAC Protocols --  |g 2.4.2.  |t Distance-Bounding Protocols --  |g 2.4.3.  |t Secure Neighbor Discovery --  |g 2.5.  |t Conclusions --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g 3.  |t Handling Security Threats to the RFID System of EPC Networks /  |r Evangelos Kranakis --  |g 3.1.  |t Introduction --  |g 3.1.1.  |t Background --  |g 3.2.  |t Threat Analysis Methodology --  |g 3.3.  |t Evaluation of Threats --  |g 3.3.1.  |t Authenticity Threats --  |g 3.3.2.  |t Integrity and Availability Threats --  |g 3.4.  |t Survey of RFID Security Defences --  |g 3.4.1.  |t Hardware-Based Primitives --  |g 3.4.2.  |t Software Protocols --  |g 3.5.  |t Future Directions for Research --  |g 3.6.  |t Conclusions --  |t Acknowledgments --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g 4.  |t Survey of Anomaly Detection Algorithms: Toward Self-Learning Networks /  |r Rumana Rahman --  |g 4.1.  |t Introduction --  |g 4.2.  |t Background --  |g 4.3.  |t Future Directions for Research: Adaptive, Online Algorithms --  |g 4.3.1.  |t Foundations --  |g 4.3.2.  |t LS Estimation Techniques --  |g 4.3.2.1.  |t Algorithms Using Updating of the Covariance Matrix --  |g 4.3.2.2.  |t Algorithms Using Orthogonal Transformations --  |g 4.3.2.3.  |t Algorithms Using Updating of the Information Matrix --  |g 4.3.2.4.  |t Algorithms Using Updating and Downdating of the QR Decompositions --  |g 4.3.2.5.  |t Error Analysis --  |g 4.3.2.6.  |t Time-Varying Parameter Estimation --  |g 4.3.2.7.  |t Applications --  |g 4.3.3.  |t Kernel Versions of LS Techniques --  |g 4.3.4.  |t Adaptive, Online Algorithms Based on LS Techniques --  |g 4.3.5.  |t Other Online and Adaptive Algorithms --  |g 4.4.  |t Conclusions --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g 5.  |t Reputation- and Trust-Based Systems for Wireless Self-Organizing Networks /  |r Jaydip Sen --  |g 5.1.  |t Introduction --  |g 5.2.  |t Trust-Definition and Concepts --  |g 5.3.  |t Trust in Wireless Self-Organizing Networks --  |g 5.3.1.  |t Wireless Self-Organizing Networks --  |g 5.3.2.  |t Misbehavior of Nodes --  |g 5.3.3.  |t Effects of Nodes' Misbehavior --  |g 5.4.  |t Reputation- and Trust-Based Systems --  |g 5.4.1.  |t Trust and its Characteristics --  |g 5.4.2.  |t Reputation Systems: Goals and Properties --  |g 5.4.3.  |t Classification of Reputation- and Trust-Based Systems --  |g 5.5.  |t Issues in Reputation Systems for Wireless Communication Networks --  |g 5.5.1.  |t Information Gathering --  |g 5.5.2.  |t Information Dissemination --  |g 5.5.3.  |t Redemption and Weighting of Time --  |g 5.5.4.  |t Weighting of Second-Hand Information --  |g 5.5.5.  |t Spurious Ratings --  |g 5.5.6.  |t Identity --  |g 5.5.7.  |t Detection --  |g 5.5.8.  |t Response --  |g 5.6.  |t Examples of Reputation and Trust-based Models --  |g 5.6.1.  |t Watchdog and Pathrater --  |g 5.6.2.  |t Context-Aware Inference Mechanism --  |g 5.6.3.  |t Trust-Based Relationship of Nodes in Ad Hoc Networks --  |g 5.6.4.  |t Trust Aggregation Scheme --  |g 5.6.5.  |t Trust Management in Ad Hoc Networks --  |g 5.6.6.  |t Trusted Routing Schemes --  |g 5.6.7.  |t Collaborative Reputation Mechanism in Mobile Ad Hoc Networks --  |g 5.6.8.  |t Cooperation of Nodes-Fairness in Dynamic Ad Hoc Networks --  |g 5.6.9.  |t Observation-Based Cooperation Enhancement in Ad Hoc Networks --  |g 5.6.10.  |t Robust Reputation System --  |g 5.6.11.  |t Reputation-Based Framework for High-Integrity Sensor Networks --  |g 5.6.12.  |t Distributed Reputation-Based Beacon Trust System --  |g 5.7.  |t Open Problems --  |g 5.8.  |t Conclusion --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g pt. II  |t MOBILE AD HOC NETWORK AND VEHICULAR AD HOC NETWORK SECURITY --  |g 6.  |t Security Threats in Mobile Ad Hoc Networks /  |r Juan E. 
505 0 0 |t Tapiador --  |g 6.1.  |t Introduction --  |g 6.2.  |t Background --  |g 6.2.1.  |t Vulnerabilities of Manets --  |g 6.2.2.  |t AODV Routing Protocol --  |g 6.3.  |t Attacks on MANET --  |g 6.3.1.  |t Adversary Model --  |g 6.3.2.  |t Attacks --  |g 6.3.2.1.  |t Passive Attacks --  |g 6.3.2.2.  |t Active Attacks --  |g 6.4.  |t Countermeasures --  |g 6.4.1.  |t Prevention Techniques: Secure Routing --  |g 6.4.2.  |t Intrusion Detection --  |g 6.4.2.1.  |t Specification-Based Intrusion Detection --  |g 6.4.2.2.  |t Anomaly-Based Intrusion Detection --  |g 6.4.2.3.  |t Misuse-Based Intrusion Detection --  |g 6.4.2.4.  |t Promiscuous Monitoring-Based Intrusion Detection --  |g 6.5.  |t Future Directions for Research --  |g 6.6.  |t Conclusions --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g 7.  |t Key Management in Mobile Ad Hoc Networks /  |r Sumit Goswami --  |g 7.1.  |t Introduction --  |g 7.1.1.  |t MANET: Introduction and Application --  |g 7.1.2.  |t Ad Hoc Network Security --  |g 7.1.3.  |t Key Management --  |g 7.2.  |t Background --  |g 7.2.1.  |t Security Issues in Wired versus Ad Hoc Network --  |g 7.2.2.  |t Design Issues --  |g 7.2.3.  |t Key Management Challenges --  |g 7.3.  |t Key Management in MANET --  |g 7.3.1.  |t Hierarchical Model --  |g 7.3.2.  |t Threshold Model --  |g 7.3.2.1.  |t Threshold Public Key Management with Partially Distributed Authority --  |g 7.3.2.2.  |t Distributed CA Based on Threshold Scheme --  |g 7.3.2.3.  |t Public Key Management Based on Identity Threshold --  |g 7.3.3.  |t Self-Organized Public Key Management --  |g 7.3.4.  |t Mobile Ad Hoc Key Revocation Server Scheme --  |g 7.3.4.1.  |t Discovery of MAKeRS in a ZoNA --  |g 7.3.4.2.  |t Message Format for Neighbor Discovery --  |g 7.3.4.3.  |t Server Discovery Algorithm --  |g 7.3.4.4.  |t Protocols --  |g 7.4.  |t Future Directions for Research --  |g 7.5.  |t Conclusions --  |t Questions and Sample Answers --  |g 8.  |t Combating against Security Attacks against Mobile Ad Hoc Networks (Manets) /  |r Marcus Scholler --  |g 8.1.  |t Introduction --  |g 8.2.  |t Background: Attack Taxonomy --  |g 8.3.  |t Network Layer Attacks against MANETs --  |g 8.3.1.  |t Wormhole Attack --  |g 8.3.1.1.  |t Countermeasures against the Wormhole Attack --  |g 8.3.2.  |t Blackhole Attack --  |g 8.3.2.1.  |t Countermeasures against the Blackhole Attack --  |g 8.3.3.  |t Byzantine Attack --  |g 8.3.3.1.  |t Byzantine Attack Prevention --  |g 8.3.4.  |t Rushing Attack --  |g 8.3.4.1.  |t Rushing Attack Solution --  |g 8.3.5.  |t Resource Consumption Attack --  |g 8.3.5.1.  |t Resource Consumption Attack Prevention --  |g 8.3.6.  |t Link Withholding and Link-Spoofing Attacks --  |g 8.3.7.  |t Replay Attacks --  |g 8.4.  |t Transport Layer Attacks against MANET --  |g 8.4.1.  |t SYN Flooding Attack --  |g 8.4.2.  |t Session Hijacking Attack --  |g 8.5.  |t Case Studies --  |g 8.5.1.  |t Collusion Attack against OLSR-Based MANETs --  |g 8.5.2.  |t Detecting Wormhole Attacks against OLSR Protocols --  |g 8.6.  |t Open Issues and Future Directions of Research --  |g 8.6.1.  |t Intrusion Detection and Prevention --  |g 8.6.2.  |t Cryptographic Techniques --  |g 8.6.3.  |t Resiliency --  |g 8.7.  |t Conclusions --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g 9.  |t Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks: A Survey /  |r Arobinda Gupta --  |g 9.1.  |t Introduction --  |g 9.2.  |t Attacks at the Physical Layer --  |g 9.3.  |t Attacks at the MAC Layer --  |g 9.3.1.  |t Selfish Misbehavior of Nodes --  |g 9.3.2.  |t Malicious Behavior of Nodes --  |g 9.3.3.  |t Other Classifications --  |g 9.3.3.1.  |t Internal versus External Attacks --  |g 9.3.3.2.  |t Active versus Passive Attacks --  |g 9.3.4.  |t Discussion and Analysis --  |g 9.4.  |t Attacks at the Network Layer --  |g 9.4.1.  |t Other Classifications --  |g 9.4.2.  |t Discussion and Analysis --  |g 9.5.  |t Attacks at the Transport Layer --  |g 9.6.  |t Attacks at the Application Layer --  |g 9.7.  |t Attacks on VANET --  |g 9.8.  |t Conclusion --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g 10.  |t Security in Vehicular Ad Hoc Networks /  |r Mozaffar Afaque --  |g 10.1.  |t Introduction --  |g 10.2.  |t Vehicular Networks: An Overview --  |g 10.3.  |t Background: Need for Security --  |g 10.3.1.  |t Security Requirements --  |g 10.3.2.  |t Challenges. 
505 0 0 |g Note continued:  |g 10.3.3.  |t Adversaries --  |g 10.3.4.  |t Attacks --  |g 10.3.5.  |t VANET Properties Supporting Security --  |g 10.4.  |t Security in VANETs --  |g 10.5.  |t Central Authorities and Vehicular PKI --  |g 10.6.  |t Secure Computing Platform: Hardware and Software for a Secure VANET Node --  |g 10.7.  |t Implementing Message Authentication and Integrity Using Digital Signatures --  |g 10.8.  |t How is Privacy and Identity Management being Handled --  |g 10.9.  |t Certificate Revocation --  |g 10.10.  |t Secure Aggregation of Data --  |g 10.11.  |t Detection of Malicious Data and Secure Position Verification --  |g 10.12.  |t Future Directions for Research --  |g 10.13.  |t Conclusions --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g 11.  |t Toward a Robust Trust Model for Ensuring Security and Privacy in Vanets /  |r Syed Ishtiaque Ahmed --  |g 11.1.  |t Introduction --  |g 11.2.  |t Background/Related Works --  |g 11.3.  |t Trust Model for VANET Preliminaries --  |g 11.3.1.  |t Characteristics of Trust Models and its Metrics --  |g 11.3.2.  |t Objectives of VANETs --  |g 11.3.3.  |t Components and Key Characteristics of VANETs --  |g 11.3.4.  |t Adversary Model for VANETs --  |g 11.3.5.  |t Salient Features of Trust Metrics in Distributed Systems and VANETs --  |g 11.4.  |t State of the Art: Data Centric Trust Management Model --  |g 11.4.1.  |t Preliminaries --  |g 11.4.2.  |t Framework --  |g 11.4.3.  |t Dynamic Factors --  |g 11.4.4.  |t Decision Logic --  |g 11.4.4.1.  |t Majority Voting --  |g 11.4.4.2.  |t Most Trusted Report --  |g 11.4.4.3.  |t Weighted Voting --  |g 11.4.4.4.  |t Bayesian Inference --  |g 11.4.4.5.  |t Dempster-Shafer Theory --  |g 11.4.4.6.  |t Application of Decision Logic --  |g 11.5.  |t Challenges and Questions --  |g 11.6.  |t Future Directions --  |g 11.7.  |t Conclusion --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g 12.  |t Sybil Attack in Vanets: Detection and Prevention /  |r V. Laxmi --  |g 12.1.  |t Introduction --  |g 12.2.  |t VANET Architecture --  |g 12.3.  |t Attacks on Vehicular Networks --  |g 12.3.1.  |t Classification of Attackers --  |g 12.3.2.  |t Types of Attacks --  |g 12.3.3.  |t Security Requirements --  |g 12.4.  |t Sybil Attack --  |g 12.5.  |t Trust Establishment --  |g 12.5.1.  |t Infrastructure-Based Trust Establishment --  |g 12.5.2.  |t Dynamic Trust Establishment --  |g 12.5.2.1.  |t History-Based Trust Establishment --  |g 12.5.2.2.  |t Self-Certified Pseudonym-Based Trust Establishment --  |g 12.5.3.  |t Analysis of Trust Establishment Approaches --  |g 12.6.  |t Detection of Sybil Attack --  |g 12.6.1.  |t Resource Testing --  |g 12.6.2.  |t Public Key Cryptography --  |g 12.6.3.  |t Passive Detection through Single Observer --  |g 12.6.4.  |t Passive Detection through Multiple Observers --  |g 12.6.5.  |t Sybil Node Detection by Propagation Model --  |g 12.6.6.  |t Active Detection by Position Verification --  |g 12.6.7.  |t Sensor-Based Position Verification --  |g 12.6.8.  |t Analysis of Sybil Detection Solutions --  |g 12.7.  |t Future Directions for Research --  |g 12.8.  |t Conclusion --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g pt. III  |t WIRELESS SENSOR NETWORK SECURITY --  |g 13.  |t Key Management Schemes of Wireless Sensor Networks: A Survey /  |r Sungyoung Lee --  |g 13.1.  |t Introduction --  |g 13.2.  |t Background --  |g 13.3.  |t Security Threats in Wireless Sensor Networks --  |g 13.4.  |t Key Management --  |g 13.5.  |t Future Directions of Research --  |g 13.6.  |t Conclusions --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g 14.  |t Key Management Techniques for Wireless Sensor Networks: Practical and Theoretical Considerations /  |r Yannis C. Stamatiou --  |g 14.1.  |t Introduction and Background --  |g 14.1.1.  |t Single Network-Wide Key --  |g 14.1.2.  |t Pairwise Key Establishment Scheme --  |g 14.1.3.  |t Random Key Predistribution --  |g 14.1.3.1.  |t Basic Scheme --  |g 14.1.3.2.  |t q-Composite Random Key Predistribution Scheme --  |g 14.1.4.  |t Deterministic Key Distribution --  |g 14.1.5.  |t Combinatorial Key Predistribution --  |g 14.1.5.1.  |t Set-Based Constructions for Key Predistribution --  |g 14.1.5.2.  |t Constructions Based on Hadamard Matrices --  |g 14.2.  |t Advanced Concepts for Key Management and Trust in WSNs --  |g 14.2.1.  |t Random Graph Models --  |g 14.2.2.  |t Randomized Scheme Based on the Fixed Radius Model --  |g 14.2.2.1.  |t Random Points in Euclidean Spaces --  |g 14.2.2.2.  |t Key Predistribution Scheme Based on Random Points on Circular Disks --  |g 14.2.3.  |t First-Order Language of Graphs --  |g 14.2.4.  |t Second-Order Language of Graphs --  |g 14.2.5.  |t Undecidable Probabilities --  |g 14.2.6.  |t Set Systems Based on Special Polynomials --  |g 14.2.6.1.  |t Some Definitions --  |g 14.2.6.2.  |t BBR Polynomials --  |g 14.3.  |t Conclusions --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g 15.  |t Bio-Inspired Intrusion Detection for Wireless Sensor Networks /  |r Fatma Mili --  |g 15.1.  |t Introduction --  |g 15.1.1.  |t Security Robustness Characteristics of Sensor Networks --  |g 15.1.2.  |t Security Vulnerability Characteristics of Sensor Networks --  |g 15.2.  |t Background --  |g 15.2.1.  |t Types of DoS Attacks that an IDS Must Deter --  |g 15.2.2.  |t Elements of a DoS Intruder Detection System --  |g 15.2.3.  |t Approaches to DoS Intruder Detection --  |g 15.2.3.1.  |t IDS Based on Deviation from Normal --  |g 15.2.3.2.  |t Selective Forwarding Attack Detection Scheme --  |g 15.2.4.  |t Summary Anomaly-Based IDS Systems for WSNs --  |g 15.3.  |t Natural and Artificial Immune Systems, General Principles --  |g 15.3.1.  |t Natural Immune Systems --  |g 15.3.2.  |t Artificial Immune Systems --  |g 15.4.  |t Representative Sample of AIS for Sensor Networks --  |g 15.4.1.  |t Sample Implementation of the Innate Immune System --  |g 15.4.1.1.  |t Background --  |g 15.4.1.2.  |t Immunity Layer Simulated --  |g 15.4.1.3.  |t Characterization of Intruders (Self vs. Non-self) --  |g 15.4.1.4.  |t Identifying Intruders and Ensuing Processes --  |g 15.4.1.5.  |t General Assessment and Simulation Results --  |g 15.4.2.  |t Example Implementation of an Adaptive Immune System: Immunity-Based Intrusion Detection for WSNs --  |g 15.4.2.1.  |t Background, Motivation --  |g 15.4.2.2.  |t Immunity Layer Simulated --  |g 15.4.2.3.  |t Characterization of Intruders (Self vs. Non-self) --  |g 15.4.2.4.  |t Identifying Intruders and Ensuing Processes --  |g 15.4.2.5.  |t General Assessment and Simulation Results --  |g 15.4.3.  |t Example Implementation of Danger Theory: An Artificial Immune System Approach with Secondary Response --  |g 15.4.3.1.  |t Background, Motivation --  |g 15.4.3.2.  |t Layer Simulated --  |g 15.4.3.3.  |t Characterization of Intruders (Self vs. Non-self) --  |g 15.4.3.4.  |t Identification of Intruders --  |g 15.4.3.5.  |t Assessment and Simulation Results --  |g 15.4.4.  |t Adaptive Immunity for WSNs --  |g 15.4.4.1.  |t Motivation --  |g 15.4.4.2.  |t Determining "Self" --  |g 15.4.4.3.  |t Simulation Examples --  |g 15.5.  |t Future Directions for Research --  |g 15.6.  |t Conclusions --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g 16.  |t Biological Inspired Autonomously Secure Mechanism for Wireless Sensor Networks /  |r Rozeha A. 
505 0 0 |t Rashid --  |g 16.1.  |t Introduction --  |g 16.1.1.  |t IEEE 802.15.4 --  |g 16.1.2.  |t Types of Applications --  |g 16.1.3.  |t Resource Constraint --  |g 16.1.4.  |t Self-Organization --  |g 16.1.5.  |t Objectives --  |g 16.1.6.  |t Organization of the Chapter --  |g 16.2.  |t Background and Related Research --  |g 16.2.1.  |t Overview of Ant Routing in WSNs --  |g 16.2.2.  |t Comparison of the Most Recent ANT-Based Routing in WSNs --  |g 16.2.3.  |t Security in WSNs --  |g 16.2.3.1.  |t Spoofed, Altered, or Replayed Routing Information --  |g 16.2.3.2.  |t Selective Forwarding --  |g 16.2.3.3.  |t Sinkhole Attacks --  |g 16.2.3.4.  |t Sybil Attacks --  |g 16.2.3.5.  |t Wormholes --  |g 16.2.3.6.  |t HELLO Flood Attack --  |g 16.2.3.7.  |t Acknowledgment Spoofing --  |g 16.2.4.  |t Overview of IDS-Based Security --  |g 16.2.5.  |t Overview of AIS-Based Security --  |g 16.2.6.  |t Overview of Keying-Based Security --  |g 16.2.7.  |t Comparison of the Most Common Secure Routing Protocols in WSNs --  |g 16.3.  |t Methodology --  |g 16.3.1.  |t System Design --  |g 16.3.2.  |t Routing Management --  |g 16.3.3.  |t Neighbor Management --  |g 16.3.4.  |t Power Management --  |g 16.3.5.  |t Forwarding Criteria --  |g 16.3.6.  |t Optimal Route Discovery --  |g 16.3.7.  |t Determination of Packet Velocity --  |g 16.3.8.  |t Determination of Link Quality --  |g 16.3.9.  |t Security Management --  |g 16.4.  |t Simulation --  |g 16.4.1.  |t Simulation Tools --  |g 16.4.2.  |t Graphical Animation of the Network --  |g 16.4.3.  |t Network Model and Performance Parameters --  |g 16.5.  |t Results --  |g 16.5.1.  |t Performance Analysis --  |g 16.6.  |t Future Directions for Research --  |g 16.7.  |t Conclusion --  |t Acknowledgment --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g 17.  |t Controlled Link Establishment Attack on Key Pre-Distribution Schemes for Distributed Sensor Networks and Countermeasures /  |r Johnson I. Agbinya --  |g 17.1.  |t Introduction --  |g 17.2.  |t Background on PKPSs for DSNs --  |g 17.2.1.  |t Mathematical Model --  |g 17.2.2.  |t Expected Properties of PKPSs --  |g 17.2.3.  |t State-of-the-Art of PKPSs --  |g 17.3.  |t Controlled Link Establishment Attack --  |g 17.3.1.  |t Node Replication Attack --  |g 17.3.2.  |t Key-Swapping Collusion Attack --  |g 17.3.2.1.  |t Short-Distance Collusion Attack --  |g 17.3.2.2.  |t Long-Distance Collusion Attack --  |g 17.3.2.3.  |t Mixed-Distance Collusion Attack --  |g 17.4.  |t Countermeasures --  |g 17.4.1.  |t Indirect Countermeasures --  |g 17.4.2.  |t Direct Countermeasures --  |g 17.4.2.1.  |t Witness-Based Detection Schemes --  |g 17.4.2.2.  |t SET: Set Operation-Based Detection Scheme --  |g 17.4.2.3.  |t Bloom Filter-Based Detection Scheme --  |g 17.4.2.4.  |t One-Way Hash Chain-Based Protection Schemes --  |g 17.5.  |t Future Research Directions --  |g 17.6.  |t Conclusions --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g 18.  |t Proactive Key Variation Owing to Dynamic Clustering (Periodic) in Sensor Networks /  |r Gihwan Cho --  |g 18.1.  |t Introduction --  |g 18.2.  |t Background --  |g 18.2.1.  |t Nonrenewal Schemes --  |g 18.2.2.  |t Reactive Renewal Schemes --  |g 18.2.3.  |t Secure CH Election Schemes. 
505 0 0 |g Note continued:  |g 18.3.  |t Network and Threat Model --  |g 18.3.1.  |t Network Model --  |g 18.3.2.  |t Threat Model --  |g 18.4.  |t Proactive Key Variation Owing to Dynamic Clustering Scheme --  |g 18.4.1.  |t Sector Formation --  |g 18.4.2.  |t Pairwise Key Establishments within Sectors --  |g 18.4.3.  |t Secure CH Election --  |g 18.4.3.1.  |t Commitment Broadcast --  |g 18.4.3.2.  |t Broadcast of Fulfillment Value --  |g 18.4.3.3.  |t Sum Generation and CH Election --  |g 18.4.3.4.  |t Adjustment of Broadcast Order --  |g 18.4.4.  |t Transmission of Sensed Data --  |g 18.5.  |t Evaluation --  |g 18.5.1.  |t Security Evaluation --  |g 18.5.2.  |t Efficiency Evaluation --  |g 18.6.  |t Synchronization and Scalability --  |g 18.7.  |t Future Directions for Research --  |g 18.8.  |t Conclusions --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g 19.  |t Secure Routing Architectures Using Cross-Layer Information for Attack Avoidance (with Case Study on Wormhole Attacks) /  |r David Pearce --  |g 19.1.  |t Introduction --  |g 19.1.1.  |t Overview of Sensor Networks --  |g 19.1.2.  |t Overview of Sensor Network Security Issues --  |g 19.1.3.  |t Techniques for Defending WSN Systems --  |g 19.1.4.  |t Wormhole Attack --  |g 19.1.4.1.  |t Wormhole Attack Classifications --  |g 19.1.4.2.  |t Response to Wormhole Attacks --  |g 19.1.5.  |t Chapter Overview --  |g 19.2.  |t Background --  |g 19.2.1.  |t Background Overview --  |g 19.2.2.  |t Packet Leashing Approaches --  |g 19.2.3.  |t Approaches Involving Additional Hardware --  |g 19.2.4.  |t Sink-Based Approaches --  |g 19.2.5.  |t Graph-Theory Approaches --  |g 19.2.6.  |t Spectral Monitoring Approaches --  |g 19.2.7.  |t Unexpected Security Benefits from Wormholes --  |g 19.3.  |t Current Research Progress --  |g 19.3.1.  |t Introduction to Current Research --  |g 19.3.2.  |t Philosophy Behind Disturbance --  |g 19.3.2.1.  |t Passive Wormholes and Static Disturbance --  |g 19.3.2.2.  |t Dynamic Disturbance for Detection --  |g 19.3.3.  |t Metric Definition --  |g 19.3.3.1.  |t Static Metric Definition --  |g 19.3.3.2.  |t Dynamic Metric Definition --  |g 19.3.4.  |t Protocol Logic and Implementation --  |g 19.3.5.  |t Scenario Description --  |g 19.3.5.1.  |t Scenario Introduction --  |g 19.3.5.2.  |t Mobility Parameters --  |g 19.3.5.3.  |t Geometry Parameters for Deployment Region --  |g 19.3.5.4.  |t Wormhole Placement Parameters --  |g 19.3.5.5.  |t Simulation Logic --  |g 19.3.5.6.  |t Success Metric Tracked by a Simulator --  |g 19.3.6.  |t Results --  |g 19.3.6.1.  |t Varying the Static Routing Exponents --  |g 19.3.6.2.  |t Using Static Disturbance in Topologies of Varying Regularity --  |g 19.3.6.3.  |t Relative Performance of Static and Dynamic Disturbance --  |g 19.3.7.  |t Customizing Metrics for Known Topologies --  |g 19.3.8.  |t Future Directions for Research --  |g 19.3.8.1.  |t Overview of Future Directions --  |g 19.3.8.2.  |t Application to the Sinkhole Attack --  |g 19.4.  |t Conclusions --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g 20.  |t Reputation-Based Trust Systems in Wireless Sensor Networks /  |r Hani Alzaid --  |g 20.1.  |t Introduction --  |g 20.2.  |t Security Concerns --  |g 20.2.1.  |t WSN Attacks --  |g 20.2.2.  |t Reputation Attacks --  |g 20.3.  |t Analysis Framework for Reputation Systems --  |g 20.3.1.  |t Information Gathering and Sharing --  |g 20.3.2.  |t Information Modeling --  |g 20.3.3.  |t Decision Making and Dissemination --  |g 20.4.  |t State-of-the-Art of Reputation-Based Trust Systems in WSNs --  |g 20.4.1.  |t Trust-Based Security System for Ubiquitous and Pervasive Computing Environments --  |g 20.4.2.  |t Reputation-Based Secure Data Aggregation in WSNs --  |g 20.4.3.  |t Trust Management Problem in Distributed WSNs --  |g 20.4.4.  |t Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks --  |g 20.4.5.  |t Performance Analysis of the Confidant Protocol --  |g 20.4.6.  |t Distributed Reputation-Based Beacon Trust --  |g 20.4.7.  |t Reputation-Based Framework for High Integrity Sensor Networks --  |g 20.4.8.  |t Trust-Based Security for Wireless Ad Hoc and Sensor Networks --  |g 20.4.9.  |t Formal Reputation System for Trusting WSNs --  |g 20.5.  |t Comparison of Current Reputation-Based Systems in WSNs --  |g 20.5.1.  |t Classification Model --  |g 20.5.2.  |t Reputation Components Visibility --  |g 20.5.3.  |t Attack Visibility --  |g 20.6.  |t Conclusion --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g 21.  |t Major Works on the Necessity and Implementations of PKC in WSNs: A Beginner's Note /  |r Al-Sakib Khan Pathan --  |g 21.1.  |t Introduction --  |g 21.2.  |t PKC in WSNs --  |g 21.3.  |t Major Challenges to Implementing PKC in WSNs --  |g 21.3.1.  |t Survey on the Notable Implementations of PKC in WSNs --  |g 21.3.1.1.  |t Types of Implementations --  |g 21.3.1.2.  |t Software Implementations --  |g 21.3.1.3.  |t Hardware Implementations --  |g 21.3.1.4.  |t Hardware/Software-Blended Implementations --  |g 21.3.2.  |t Summary of Implementations --  |g 21.4.  |t Conclusions and Future Expectations --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g pt. IV  |t WIRELESS MESH NETWORK SECURITY --  |g 22.  |t Secure Access Control and Authentication in Wireless Mesh Networks /  |r Ranga Reddy --  |g 22.1.  |t Introduction --  |g 22.2.  |t Background --  |g 22.2.1.  |t Wireless Mesh Network --  |g 22.2.2.  |t Authentication Schemes in WLANs --  |g 22.2.2.1.  |t IEEE 802.1X Authentication --  |g 22.2.2.2.  |t IEEE 802.1X Limitations --  |g 22.3.  |t Access Control and Authentication in WMN --  |g 22.3.1.  |t Authentication-Related Security Attacks --  |g 22.3.2.  |t Secure Authentication Assumptions --  |g 22.3.3.  |t Requirements for Authentication in WMNs --  |g 22.3.3.1.  |t Security Requirements --  |g 22.3.3.2.  |t Performance Requirements --  |g 22.4.  |t Access Control and Authentication Schemes --  |g 22.4.1.  |t Localized Authentication Based on Public Certificate --  |g 22.4.2.  |t Predictive Authentication and Preauthentication --  |g 22.4.3.  |t EAP-based Authentication Schemes for WMNs --  |g 22.4.4.  |t Identity-Based Cryptography-Based Authentication --  |g 22.4.4.1.  |t Identity-Based Cryptography --  |g 22.4.4.2.  |t ID-Based Authentication in WMNs --  |g 22.5.  |t Future Directions for Research --  |g 22.6.  |t Conclusions --  |t Terminologies --  |t Questions and Sample Answers --  |t Author's Biography --  |t References --  |g 23.  |t Misbehavior Detection in Wireless Mesh Networks /  |r Md. Shariful Islam. 
520 |a Reflecting recent advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and often-used terms to set the foundation for the following chapters. Examining critical security issues in a range of wireless networks, the book proposes specific solutions to security threats. Ideal for those with a basic understanding of network security, the text provides a clear examination of the key aspects of security in self-organizing networks and othe. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Ad hoc networks (Computer networks)  |x Security measures. 
650 0 |a Self-organizing systems  |x Security measures. 
650 6 |a Réseaux ad hoc (Réseaux d'ordinateurs)  |x Sécurité  |x Mesures. 
650 6 |a Systèmes auto-organisés  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
700 1 |a Pathan, Al-Sakib Khan. 
758 |i has work:  |a Security of self-organizing networks (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCH8V8CYtPKjrTbQjk6d683  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |t Security of self-organizing networks.  |d Boca Raton : Auerbach Pub., ©2011  |z 9781439819197  |w (DLC) 2010028807  |w (OCoLC)656158701 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=599718  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24132594 
938 |a Books 24x7  |b B247  |n bks00036989 
938 |a EBL - Ebook Library  |b EBLB  |n EBL599718 
938 |a ebrary  |b EBRY  |n ebr10424669 
938 |a EBSCOhost  |b EBSC  |n 342382 
938 |a Taylor & Francis  |b TAFR  |n AUP0KE10902PDF 
938 |a Taylor & Francis  |b TAFR  |n 9780429094392 
938 |a YBP Library Services  |b YANK  |n 15917216 
938 |a YBP Library Services  |b YANK  |n 3347544 
994 |a 92  |b IZTAP