Security for multihop wireless networks /
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks,...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boca Raton :
CRC Press, Taylor & Francis Group,
[2014]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Front Cover; Contents; Preface; Contributors; Chapter 1: Taxonomy and Holistic Detection of Security Attacks in MANETs; Chapter 2: Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks; Chapter 3: Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks; Chapter 4: Fighting against Black Hole Attacks in Mobile Ad Hoc Networks; Chapter 5: Mutual Authentication in IP Mobility-Enabled Multihop Wireless Networks; Chapter 6: Detection of Misbehaving Nodes in Vehicular Ad Hoc Network.
- Chapter 7: Security Architecture for Multihop Wireless Sensor NetworksChapter 8: Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach; Chapter 9: TinyKey: A Pragmatic and Energy Efficient Security Layer for Wireless Sensor Networks; Chapter 10: Secure Multipurpose Wireless Sensor Networks; Chapter 11: Anomaly Detection in Wireless Sensor Networks: Challenges and Future Trends; Chapter 12: Taxonomy of Security Protocols for Wireless Sensor Communications.
- Chapter 13: Securing the Control of Euler-Lagrange Systems in Networked Environments with Model-Free Sliding Mode ControlChapter 14: Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc Networks; Chapter 15: Security Issues in Machine-to-Machine Communication; Chapter 16: Authentication in Wireless Mesh Networks; Chapter 17: Wireless-Based Application-Layer Cross-Layer Design with Simultaneous Quality of Service and Security Support; Chapter 18: Security, Trust, and Privacy in Opportunistic Multihop Wireless Networks; Back Cover.