Security of self-organizing networks : MANET, WSN, WMN, VANET /
Reflecting recent advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and often-used terms to set the foundation for the following chapters. Examining critical security i...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boca Raton :
Auerbach Pub.,
©2011.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Machine generated contents note: pt. I GENERAL TOPICS: SECURITY OF WIRELESS AND SELF-ORGANIZING NETWORKS
- 1. Secure Device Association: Trends and Issues / Ian Wakeman
- 1.1. Introduction
- 1.2. Background
- 1.2.1. Attack Types in Device Association Model
- 1.2.1.1. Eavesdropping
- 1.2.1.2. MiTM Attack
- 1.2.1.3. DoS Attack
- 1.2.1.4. Bidding-Down Attack
- 1.2.1.5. Compromised Devices
- 1.2.2. Device Association in Ad Hoc Environments
- 1.2.2.1. Resurrecting Duckling Security Model
- 1.2.2.2. Talking to Strangers
- 1.2.2.3. Device Association Using Visual Out-of-Band Channels
- 1.2.2.4. Device Association Using Audio Out-of-Band Channels
- 1.2.2.5. Device Association Using Accelerometers
- 1.2.2.6. Device Association Using Radio Signals
- 1.2.2.7. Device Association Using Biometric Data
- 1.2.2.8. Button-Enabled Device Association (BEDA)
- 1.2.2.9. Bluetooth Pairing
- 1.2.2.10. Device Association Using Near-Field Communication Technology
- 1.2.2.11. Wireless Universal Serial Bus (WUSB) Association, WPS, and Windows Connect now-Net
- 1.2.3. Comparative Analysis of Device Association Methods
- 1.3. Future Directions for Research
- 1.4. Conclusions
- Acknowledgments
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- 2. Securing Route and Path Integrity in Multihop Wireless Networks / Vallipuram Muthukkumarasamy
- 2.1. Introduction
- 2.1.1. IEEE 802.11 and IEEE 802.11s
- 2.1.2. Implementation Support
- 2.2. Background
- 2.2.1. Routing Protocols
- 2.2.1.1. Proactive Routing Protocols
- 2.2.1.2. Reactive Routing Protocols
- 2.2.2. Path-Selection Protocols
- 2.3. Securing Routing and Path Selection
- 2.3.1. Threat Model
- 2.3.1.1. Threats Posed by Outsider Attacks
- 2.3.1.2. Threats Posed by Compromised Nodes
- 2.3.2. Attacks against Routing and Path Selection
- 2.3.2.1. Rushing Attacks
- 2.3.2.2. Gray Holes and Black Holes
- 2.3.2.3. Wormholes
- 2.3.3. Defenses
- 2.3.3.1. Authenticated Routing
- 2.3.3.2. Pathrater/Watchdog
- 2.3.3.3. Packet Leashes
- 2.4. Future Directions for Research
- 2.4.1. Secure MAC Protocols
- 2.4.2. Distance-Bounding Protocols
- 2.4.3. Secure Neighbor Discovery
- 2.5. Conclusions
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- 3. Handling Security Threats to the RFID System of EPC Networks / Evangelos Kranakis
- 3.1. Introduction
- 3.1.1. Background
- 3.2. Threat Analysis Methodology
- 3.3. Evaluation of Threats
- 3.3.1. Authenticity Threats
- 3.3.2. Integrity and Availability Threats
- 3.4. Survey of RFID Security Defences
- 3.4.1. Hardware-Based Primitives
- 3.4.2. Software Protocols
- 3.5. Future Directions for Research
- 3.6. Conclusions
- Acknowledgments
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- 4. Survey of Anomaly Detection Algorithms: Toward Self-Learning Networks / Rumana Rahman
- 4.1. Introduction
- 4.2. Background
- 4.3. Future Directions for Research: Adaptive, Online Algorithms
- 4.3.1. Foundations
- 4.3.2. LS Estimation Techniques
- 4.3.2.1. Algorithms Using Updating of the Covariance Matrix
- 4.3.2.2. Algorithms Using Orthogonal Transformations
- 4.3.2.3. Algorithms Using Updating of the Information Matrix
- 4.3.2.4. Algorithms Using Updating and Downdating of the QR Decompositions
- 4.3.2.5. Error Analysis
- 4.3.2.6. Time-Varying Parameter Estimation
- 4.3.2.7. Applications
- 4.3.3. Kernel Versions of LS Techniques
- 4.3.4. Adaptive, Online Algorithms Based on LS Techniques
- 4.3.5. Other Online and Adaptive Algorithms
- 4.4. Conclusions
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- 5. Reputation- and Trust-Based Systems for Wireless Self-Organizing Networks / Jaydip Sen
- 5.1. Introduction
- 5.2. Trust-Definition and Concepts
- 5.3. Trust in Wireless Self-Organizing Networks
- 5.3.1. Wireless Self-Organizing Networks
- 5.3.2. Misbehavior of Nodes
- 5.3.3. Effects of Nodes' Misbehavior
- 5.4. Reputation- and Trust-Based Systems
- 5.4.1. Trust and its Characteristics
- 5.4.2. Reputation Systems: Goals and Properties
- 5.4.3. Classification of Reputation- and Trust-Based Systems
- 5.5. Issues in Reputation Systems for Wireless Communication Networks
- 5.5.1. Information Gathering
- 5.5.2. Information Dissemination
- 5.5.3. Redemption and Weighting of Time
- 5.5.4. Weighting of Second-Hand Information
- 5.5.5. Spurious Ratings
- 5.5.6. Identity
- 5.5.7. Detection
- 5.5.8. Response
- 5.6. Examples of Reputation and Trust-based Models
- 5.6.1. Watchdog and Pathrater
- 5.6.2. Context-Aware Inference Mechanism
- 5.6.3. Trust-Based Relationship of Nodes in Ad Hoc Networks
- 5.6.4. Trust Aggregation Scheme
- 5.6.5. Trust Management in Ad Hoc Networks
- 5.6.6. Trusted Routing Schemes
- 5.6.7. Collaborative Reputation Mechanism in Mobile Ad Hoc Networks
- 5.6.8. Cooperation of Nodes-Fairness in Dynamic Ad Hoc Networks
- 5.6.9. Observation-Based Cooperation Enhancement in Ad Hoc Networks
- 5.6.10. Robust Reputation System
- 5.6.11. Reputation-Based Framework for High-Integrity Sensor Networks
- 5.6.12. Distributed Reputation-Based Beacon Trust System
- 5.7. Open Problems
- 5.8. Conclusion
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- pt. II MOBILE AD HOC NETWORK AND VEHICULAR AD HOC NETWORK SECURITY
- 6. Security Threats in Mobile Ad Hoc Networks / Juan E.
- Tapiador
- 6.1. Introduction
- 6.2. Background
- 6.2.1. Vulnerabilities of Manets
- 6.2.2. AODV Routing Protocol
- 6.3. Attacks on MANET
- 6.3.1. Adversary Model
- 6.3.2. Attacks
- 6.3.2.1. Passive Attacks
- 6.3.2.2. Active Attacks
- 6.4. Countermeasures
- 6.4.1. Prevention Techniques: Secure Routing
- 6.4.2. Intrusion Detection
- 6.4.2.1. Specification-Based Intrusion Detection
- 6.4.2.2. Anomaly-Based Intrusion Detection
- 6.4.2.3. Misuse-Based Intrusion Detection
- 6.4.2.4. Promiscuous Monitoring-Based Intrusion Detection
- 6.5. Future Directions for Research
- 6.6. Conclusions
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- 7. Key Management in Mobile Ad Hoc Networks / Sumit Goswami
- 7.1. Introduction
- 7.1.1. MANET: Introduction and Application
- 7.1.2. Ad Hoc Network Security
- 7.1.3. Key Management
- 7.2. Background
- 7.2.1. Security Issues in Wired versus Ad Hoc Network
- 7.2.2. Design Issues
- 7.2.3. Key Management Challenges
- 7.3. Key Management in MANET
- 7.3.1. Hierarchical Model
- 7.3.2. Threshold Model
- 7.3.2.1. Threshold Public Key Management with Partially Distributed Authority
- 7.3.2.2. Distributed CA Based on Threshold Scheme
- 7.3.2.3. Public Key Management Based on Identity Threshold
- 7.3.3. Self-Organized Public Key Management
- 7.3.4. Mobile Ad Hoc Key Revocation Server Scheme
- 7.3.4.1. Discovery of MAKeRS in a ZoNA
- 7.3.4.2. Message Format for Neighbor Discovery
- 7.3.4.3. Server Discovery Algorithm
- 7.3.4.4. Protocols
- 7.4. Future Directions for Research
- 7.5. Conclusions
- Questions and Sample Answers
- 8. Combating against Security Attacks against Mobile Ad Hoc Networks (Manets) / Marcus Scholler
- 8.1. Introduction
- 8.2. Background: Attack Taxonomy
- 8.3. Network Layer Attacks against MANETs
- 8.3.1. Wormhole Attack
- 8.3.1.1. Countermeasures against the Wormhole Attack
- 8.3.2. Blackhole Attack
- 8.3.2.1. Countermeasures against the Blackhole Attack
- 8.3.3. Byzantine Attack
- 8.3.3.1. Byzantine Attack Prevention
- 8.3.4. Rushing Attack
- 8.3.4.1. Rushing Attack Solution
- 8.3.5. Resource Consumption Attack
- 8.3.5.1. Resource Consumption Attack Prevention
- 8.3.6. Link Withholding and Link-Spoofing Attacks
- 8.3.7. Replay Attacks
- 8.4. Transport Layer Attacks against MANET
- 8.4.1. SYN Flooding Attack
- 8.4.2. Session Hijacking Attack
- 8.5. Case Studies
- 8.5.1. Collusion Attack against OLSR-Based MANETs
- 8.5.2. Detecting Wormhole Attacks against OLSR Protocols
- 8.6. Open Issues and Future Directions of Research
- 8.6.1. Intrusion Detection and Prevention
- 8.6.2. Cryptographic Techniques
- 8.6.3. Resiliency
- 8.7. Conclusions
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- 9. Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks: A Survey / Arobinda Gupta
- 9.1. Introduction
- 9.2. Attacks at the Physical Layer
- 9.3. Attacks at the MAC Layer
- 9.3.1. Selfish Misbehavior of Nodes
- 9.3.2. Malicious Behavior of Nodes
- 9.3.3. Other Classifications
- 9.3.3.1. Internal versus External Attacks
- 9.3.3.2. Active versus Passive Attacks
- 9.3.4. Discussion and Analysis
- 9.4. Attacks at the Network Layer
- 9.4.1. Other Classifications
- 9.4.2. Discussion and Analysis
- 9.5. Attacks at the Transport Layer
- 9.6. Attacks at the Application Layer
- 9.7. Attacks on VANET
- 9.8. Conclusion
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- 10. Security in Vehicular Ad Hoc Networks / Mozaffar Afaque
- 10.1. Introduction
- 10.2. Vehicular Networks: An Overview
- 10.3. Background: Need for Security
- 10.3.1. Security Requirements
- 10.3.2. Challenges.
- Note continued: 10.3.3. Adversaries
- 10.3.4. Attacks
- 10.3.5. VANET Properties Supporting Security
- 10.4. Security in VANETs
- 10.5. Central Authorities and Vehicular PKI
- 10.6. Secure Computing Platform: Hardware and Software for a Secure VANET Node
- 10.7. Implementing Message Authentication and Integrity Using Digital Signatures
- 10.8. How is Privacy and Identity Management being Handled
- 10.9. Certificate Revocation
- 10.10. Secure Aggregation of Data
- 10.11. Detection of Malicious Data and Secure Position Verification
- 10.12. Future Directions for Research
- 10.13. Conclusions
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- 11. Toward a Robust Trust Model for Ensuring Security and Privacy in Vanets / Syed Ishtiaque Ahmed
- 11.1. Introduction
- 11.2. Background/Related Works
- 11.3. Trust Model for VANET Preliminaries
- 11.3.1. Characteristics of Trust Models and its Metrics
- 11.3.2. Objectives of VANETs
- 11.3.3. Components and Key Characteristics of VANETs
- 11.3.4. Adversary Model for VANETs
- 11.3.5. Salient Features of Trust Metrics in Distributed Systems and VANETs
- 11.4. State of the Art: Data Centric Trust Management Model
- 11.4.1. Preliminaries
- 11.4.2. Framework
- 11.4.3. Dynamic Factors
- 11.4.4. Decision Logic
- 11.4.4.1. Majority Voting
- 11.4.4.2. Most Trusted Report
- 11.4.4.3. Weighted Voting
- 11.4.4.4. Bayesian Inference
- 11.4.4.5. Dempster-Shafer Theory
- 11.4.4.6. Application of Decision Logic
- 11.5. Challenges and Questions
- 11.6. Future Directions
- 11.7. Conclusion
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- 12. Sybil Attack in Vanets: Detection and Prevention / V. Laxmi
- 12.1. Introduction
- 12.2. VANET Architecture
- 12.3. Attacks on Vehicular Networks
- 12.3.1. Classification of Attackers
- 12.3.2. Types of Attacks
- 12.3.3. Security Requirements
- 12.4. Sybil Attack
- 12.5. Trust Establishment
- 12.5.1. Infrastructure-Based Trust Establishment
- 12.5.2. Dynamic Trust Establishment
- 12.5.2.1. History-Based Trust Establishment
- 12.5.2.2. Self-Certified Pseudonym-Based Trust Establishment
- 12.5.3. Analysis of Trust Establishment Approaches
- 12.6. Detection of Sybil Attack
- 12.6.1. Resource Testing
- 12.6.2. Public Key Cryptography
- 12.6.3. Passive Detection through Single Observer
- 12.6.4. Passive Detection through Multiple Observers
- 12.6.5. Sybil Node Detection by Propagation Model
- 12.6.6. Active Detection by Position Verification
- 12.6.7. Sensor-Based Position Verification
- 12.6.8. Analysis of Sybil Detection Solutions
- 12.7. Future Directions for Research
- 12.8. Conclusion
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- pt. III WIRELESS SENSOR NETWORK SECURITY
- 13. Key Management Schemes of Wireless Sensor Networks: A Survey / Sungyoung Lee
- 13.1. Introduction
- 13.2. Background
- 13.3. Security Threats in Wireless Sensor Networks
- 13.4. Key Management
- 13.5. Future Directions of Research
- 13.6. Conclusions
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- 14. Key Management Techniques for Wireless Sensor Networks: Practical and Theoretical Considerations / Yannis C. Stamatiou
- 14.1. Introduction and Background
- 14.1.1. Single Network-Wide Key
- 14.1.2. Pairwise Key Establishment Scheme
- 14.1.3. Random Key Predistribution
- 14.1.3.1. Basic Scheme
- 14.1.3.2. q-Composite Random Key Predistribution Scheme
- 14.1.4. Deterministic Key Distribution
- 14.1.5. Combinatorial Key Predistribution
- 14.1.5.1. Set-Based Constructions for Key Predistribution
- 14.1.5.2. Constructions Based on Hadamard Matrices
- 14.2. Advanced Concepts for Key Management and Trust in WSNs
- 14.2.1. Random Graph Models
- 14.2.2. Randomized Scheme Based on the Fixed Radius Model
- 14.2.2.1. Random Points in Euclidean Spaces
- 14.2.2.2. Key Predistribution Scheme Based on Random Points on Circular Disks
- 14.2.3. First-Order Language of Graphs
- 14.2.4. Second-Order Language of Graphs
- 14.2.5. Undecidable Probabilities
- 14.2.6. Set Systems Based on Special Polynomials
- 14.2.6.1. Some Definitions
- 14.2.6.2. BBR Polynomials
- 14.3. Conclusions
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- 15. Bio-Inspired Intrusion Detection for Wireless Sensor Networks / Fatma Mili
- 15.1. Introduction
- 15.1.1. Security Robustness Characteristics of Sensor Networks
- 15.1.2. Security Vulnerability Characteristics of Sensor Networks
- 15.2. Background
- 15.2.1. Types of DoS Attacks that an IDS Must Deter
- 15.2.2. Elements of a DoS Intruder Detection System
- 15.2.3. Approaches to DoS Intruder Detection
- 15.2.3.1. IDS Based on Deviation from Normal
- 15.2.3.2. Selective Forwarding Attack Detection Scheme
- 15.2.4. Summary Anomaly-Based IDS Systems for WSNs
- 15.3. Natural and Artificial Immune Systems, General Principles
- 15.3.1. Natural Immune Systems
- 15.3.2. Artificial Immune Systems
- 15.4. Representative Sample of AIS for Sensor Networks
- 15.4.1. Sample Implementation of the Innate Immune System
- 15.4.1.1. Background
- 15.4.1.2. Immunity Layer Simulated
- 15.4.1.3. Characterization of Intruders (Self vs. Non-self)
- 15.4.1.4. Identifying Intruders and Ensuing Processes
- 15.4.1.5. General Assessment and Simulation Results
- 15.4.2. Example Implementation of an Adaptive Immune System: Immunity-Based Intrusion Detection for WSNs
- 15.4.2.1. Background, Motivation
- 15.4.2.2. Immunity Layer Simulated
- 15.4.2.3. Characterization of Intruders (Self vs. Non-self)
- 15.4.2.4. Identifying Intruders and Ensuing Processes
- 15.4.2.5. General Assessment and Simulation Results
- 15.4.3. Example Implementation of Danger Theory: An Artificial Immune System Approach with Secondary Response
- 15.4.3.1. Background, Motivation
- 15.4.3.2. Layer Simulated
- 15.4.3.3. Characterization of Intruders (Self vs. Non-self)
- 15.4.3.4. Identification of Intruders
- 15.4.3.5. Assessment and Simulation Results
- 15.4.4. Adaptive Immunity for WSNs
- 15.4.4.1. Motivation
- 15.4.4.2. Determining "Self"
- 15.4.4.3. Simulation Examples
- 15.5. Future Directions for Research
- 15.6. Conclusions
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- 16. Biological Inspired Autonomously Secure Mechanism for Wireless Sensor Networks / Rozeha A.
- Rashid
- 16.1. Introduction
- 16.1.1. IEEE 802.15.4
- 16.1.2. Types of Applications
- 16.1.3. Resource Constraint
- 16.1.4. Self-Organization
- 16.1.5. Objectives
- 16.1.6. Organization of the Chapter
- 16.2. Background and Related Research
- 16.2.1. Overview of Ant Routing in WSNs
- 16.2.2. Comparison of the Most Recent ANT-Based Routing in WSNs
- 16.2.3. Security in WSNs
- 16.2.3.1. Spoofed, Altered, or Replayed Routing Information
- 16.2.3.2. Selective Forwarding
- 16.2.3.3. Sinkhole Attacks
- 16.2.3.4. Sybil Attacks
- 16.2.3.5. Wormholes
- 16.2.3.6. HELLO Flood Attack
- 16.2.3.7. Acknowledgment Spoofing
- 16.2.4. Overview of IDS-Based Security
- 16.2.5. Overview of AIS-Based Security
- 16.2.6. Overview of Keying-Based Security
- 16.2.7. Comparison of the Most Common Secure Routing Protocols in WSNs
- 16.3. Methodology
- 16.3.1. System Design
- 16.3.2. Routing Management
- 16.3.3. Neighbor Management
- 16.3.4. Power Management
- 16.3.5. Forwarding Criteria
- 16.3.6. Optimal Route Discovery
- 16.3.7. Determination of Packet Velocity
- 16.3.8. Determination of Link Quality
- 16.3.9. Security Management
- 16.4. Simulation
- 16.4.1. Simulation Tools
- 16.4.2. Graphical Animation of the Network
- 16.4.3. Network Model and Performance Parameters
- 16.5. Results
- 16.5.1. Performance Analysis
- 16.6. Future Directions for Research
- 16.7. Conclusion
- Acknowledgment
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- 17. Controlled Link Establishment Attack on Key Pre-Distribution Schemes for Distributed Sensor Networks and Countermeasures / Johnson I. Agbinya
- 17.1. Introduction
- 17.2. Background on PKPSs for DSNs
- 17.2.1. Mathematical Model
- 17.2.2. Expected Properties of PKPSs
- 17.2.3. State-of-the-Art of PKPSs
- 17.3. Controlled Link Establishment Attack
- 17.3.1. Node Replication Attack
- 17.3.2. Key-Swapping Collusion Attack
- 17.3.2.1. Short-Distance Collusion Attack
- 17.3.2.2. Long-Distance Collusion Attack
- 17.3.2.3. Mixed-Distance Collusion Attack
- 17.4. Countermeasures
- 17.4.1. Indirect Countermeasures
- 17.4.2. Direct Countermeasures
- 17.4.2.1. Witness-Based Detection Schemes
- 17.4.2.2. SET: Set Operation-Based Detection Scheme
- 17.4.2.3. Bloom Filter-Based Detection Scheme
- 17.4.2.4. One-Way Hash Chain-Based Protection Schemes
- 17.5. Future Research Directions
- 17.6. Conclusions
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- 18. Proactive Key Variation Owing to Dynamic Clustering (Periodic) in Sensor Networks / Gihwan Cho
- 18.1. Introduction
- 18.2. Background
- 18.2.1. Nonrenewal Schemes
- 18.2.2. Reactive Renewal Schemes
- 18.2.3. Secure CH Election Schemes.
- Note continued: 18.3. Network and Threat Model
- 18.3.1. Network Model
- 18.3.2. Threat Model
- 18.4. Proactive Key Variation Owing to Dynamic Clustering Scheme
- 18.4.1. Sector Formation
- 18.4.2. Pairwise Key Establishments within Sectors
- 18.4.3. Secure CH Election
- 18.4.3.1. Commitment Broadcast
- 18.4.3.2. Broadcast of Fulfillment Value
- 18.4.3.3. Sum Generation and CH Election
- 18.4.3.4. Adjustment of Broadcast Order
- 18.4.4. Transmission of Sensed Data
- 18.5. Evaluation
- 18.5.1. Security Evaluation
- 18.5.2. Efficiency Evaluation
- 18.6. Synchronization and Scalability
- 18.7. Future Directions for Research
- 18.8. Conclusions
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- 19. Secure Routing Architectures Using Cross-Layer Information for Attack Avoidance (with Case Study on Wormhole Attacks) / David Pearce
- 19.1. Introduction
- 19.1.1. Overview of Sensor Networks
- 19.1.2. Overview of Sensor Network Security Issues
- 19.1.3. Techniques for Defending WSN Systems
- 19.1.4. Wormhole Attack
- 19.1.4.1. Wormhole Attack Classifications
- 19.1.4.2. Response to Wormhole Attacks
- 19.1.5. Chapter Overview
- 19.2. Background
- 19.2.1. Background Overview
- 19.2.2. Packet Leashing Approaches
- 19.2.3. Approaches Involving Additional Hardware
- 19.2.4. Sink-Based Approaches
- 19.2.5. Graph-Theory Approaches
- 19.2.6. Spectral Monitoring Approaches
- 19.2.7. Unexpected Security Benefits from Wormholes
- 19.3. Current Research Progress
- 19.3.1. Introduction to Current Research
- 19.3.2. Philosophy Behind Disturbance
- 19.3.2.1. Passive Wormholes and Static Disturbance
- 19.3.2.2. Dynamic Disturbance for Detection
- 19.3.3. Metric Definition
- 19.3.3.1. Static Metric Definition
- 19.3.3.2. Dynamic Metric Definition
- 19.3.4. Protocol Logic and Implementation
- 19.3.5. Scenario Description
- 19.3.5.1. Scenario Introduction
- 19.3.5.2. Mobility Parameters
- 19.3.5.3. Geometry Parameters for Deployment Region
- 19.3.5.4. Wormhole Placement Parameters
- 19.3.5.5. Simulation Logic
- 19.3.5.6. Success Metric Tracked by a Simulator
- 19.3.6. Results
- 19.3.6.1. Varying the Static Routing Exponents
- 19.3.6.2. Using Static Disturbance in Topologies of Varying Regularity
- 19.3.6.3. Relative Performance of Static and Dynamic Disturbance
- 19.3.7. Customizing Metrics for Known Topologies
- 19.3.8. Future Directions for Research
- 19.3.8.1. Overview of Future Directions
- 19.3.8.2. Application to the Sinkhole Attack
- 19.4. Conclusions
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- 20. Reputation-Based Trust Systems in Wireless Sensor Networks / Hani Alzaid
- 20.1. Introduction
- 20.2. Security Concerns
- 20.2.1. WSN Attacks
- 20.2.2. Reputation Attacks
- 20.3. Analysis Framework for Reputation Systems
- 20.3.1. Information Gathering and Sharing
- 20.3.2. Information Modeling
- 20.3.3. Decision Making and Dissemination
- 20.4. State-of-the-Art of Reputation-Based Trust Systems in WSNs
- 20.4.1. Trust-Based Security System for Ubiquitous and Pervasive Computing Environments
- 20.4.2. Reputation-Based Secure Data Aggregation in WSNs
- 20.4.3. Trust Management Problem in Distributed WSNs
- 20.4.4. Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks
- 20.4.5. Performance Analysis of the Confidant Protocol
- 20.4.6. Distributed Reputation-Based Beacon Trust
- 20.4.7. Reputation-Based Framework for High Integrity Sensor Networks
- 20.4.8. Trust-Based Security for Wireless Ad Hoc and Sensor Networks
- 20.4.9. Formal Reputation System for Trusting WSNs
- 20.5. Comparison of Current Reputation-Based Systems in WSNs
- 20.5.1. Classification Model
- 20.5.2. Reputation Components Visibility
- 20.5.3. Attack Visibility
- 20.6. Conclusion
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- 21. Major Works on the Necessity and Implementations of PKC in WSNs: A Beginner's Note / Al-Sakib Khan Pathan
- 21.1. Introduction
- 21.2. PKC in WSNs
- 21.3. Major Challenges to Implementing PKC in WSNs
- 21.3.1. Survey on the Notable Implementations of PKC in WSNs
- 21.3.1.1. Types of Implementations
- 21.3.1.2. Software Implementations
- 21.3.1.3. Hardware Implementations
- 21.3.1.4. Hardware/Software-Blended Implementations
- 21.3.2. Summary of Implementations
- 21.4. Conclusions and Future Expectations
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- pt. IV WIRELESS MESH NETWORK SECURITY
- 22. Secure Access Control and Authentication in Wireless Mesh Networks / Ranga Reddy
- 22.1. Introduction
- 22.2. Background
- 22.2.1. Wireless Mesh Network
- 22.2.2. Authentication Schemes in WLANs
- 22.2.2.1. IEEE 802.1X Authentication
- 22.2.2.2. IEEE 802.1X Limitations
- 22.3. Access Control and Authentication in WMN
- 22.3.1. Authentication-Related Security Attacks
- 22.3.2. Secure Authentication Assumptions
- 22.3.3. Requirements for Authentication in WMNs
- 22.3.3.1. Security Requirements
- 22.3.3.2. Performance Requirements
- 22.4. Access Control and Authentication Schemes
- 22.4.1. Localized Authentication Based on Public Certificate
- 22.4.2. Predictive Authentication and Preauthentication
- 22.4.3. EAP-based Authentication Schemes for WMNs
- 22.4.4. Identity-Based Cryptography-Based Authentication
- 22.4.4.1. Identity-Based Cryptography
- 22.4.4.2. ID-Based Authentication in WMNs
- 22.5. Future Directions for Research
- 22.6. Conclusions
- Terminologies
- Questions and Sample Answers
- Author's Biography
- References
- 23. Misbehavior Detection in Wireless Mesh Networks / Md. Shariful Islam.