Cargando…

Security for multihop wireless networks /

Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks,...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Khan, Shafiullah (Editor ), Lloret Mauri, Jaime (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton : CRC Press, Taylor & Francis Group, [2014]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Front Cover; Contents; Preface; Contributors; Chapter 1: Taxonomy and Holistic Detection of Security Attacks in MANETs; Chapter 2: Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks; Chapter 3: Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks; Chapter 4: Fighting against Black Hole Attacks in Mobile Ad Hoc Networks; Chapter 5: Mutual Authentication in IP Mobility-Enabled Multihop Wireless Networks; Chapter 6: Detection of Misbehaving Nodes in Vehicular Ad Hoc Network.
  • Chapter 7: Security Architecture for Multihop Wireless Sensor NetworksChapter 8: Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach; Chapter 9: TinyKey: A Pragmatic and Energy Efficient Security Layer for Wireless Sensor Networks; Chapter 10: Secure Multipurpose Wireless Sensor Networks; Chapter 11: Anomaly Detection in Wireless Sensor Networks: Challenges and Future Trends; Chapter 12: Taxonomy of Security Protocols for Wireless Sensor Communications.
  • Chapter 13: Securing the Control of Euler-Lagrange Systems in Networked Environments with Model-Free Sliding Mode ControlChapter 14: Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc Networks; Chapter 15: Security Issues in Machine-to-Machine Communication; Chapter 16: Authentication in Wireless Mesh Networks; Chapter 17: Wireless-Based Application-Layer Cross-Layer Design with Simultaneous Quality of Service and Security Support; Chapter 18: Security, Trust, and Privacy in Opportunistic Multihop Wireless Networks; Back Cover.