• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Security for Wireless Ad Hoc Networks » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2950560]
• Literatura piękna
 [1849509]

  więcej...
• Turystyka
 [71097]
• Informatyka
 [151150]
• Komiksy
 [35848]
• Encyklopedie
 [23178]
• Dziecięca
 [617388]
• Hobby
 [139064]
• AudioBooki
 [1657]
• Literatura faktu
 [228597]
• Muzyka CD
 [383]
• Słowniki
 [2855]
• Inne
 [445295]
• Kalendarze
 [1464]
• Podręczniki
 [167547]
• Poradniki
 [480102]
• Religia
 [510749]
• Czasopisma
 [516]
• Sport
 [61293]
• Sztuka
 [243352]
• CD, DVD, Video
 [3414]
• Technologie
 [219456]
• Zdrowie
 [101002]
• Książkowe Klimaty
 [124]
• Zabawki
 [2311]
• Puzzle, gry
 [3459]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8079]
Kategorie szczegółowe BISAC

Security for Wireless Ad Hoc Networks

ISBN-13: 9780471756880 / Angielski / Miękka / 2007 / 264 str.

Farooq Anjum; Petros Mouchtaris
Security for Wireless Ad Hoc Networks Farooq Anjum Petros Mouchtaris 9780471756880 Wiley-Interscience - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Security for Wireless Ad Hoc Networks

ISBN-13: 9780471756880 / Angielski / Miękka / 2007 / 264 str.

Farooq Anjum; Petros Mouchtaris
cena 541,78
(netto: 515,98 VAT:  5%)

Najniższa cena z 30 dni: 538,44
Termin realizacji zamówienia:
ok. 30 dni roboczych
Dostawa w 2026 r.

Darmowa dostawa!

This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments.
An Instructor Support FTP site is available from the Wiley editorial board.

Kategorie:
Technologie
Kategorie BISAC:
Technology & Engineering > Telecommunications
Computers > Security - General
Wydawca:
Wiley-Interscience
Język:
Angielski
ISBN-13:
9780471756880
Rok wydania:
2007
Ilość stron:
264
Waga:
0.45 kg
Wymiary:
25.1 x 18.01 x 1.32
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Bibliografia
Wydanie ilustrowane

" a first–class textbook on security in ad hoc networks." ( Computing Reviews.com, May 17, 2007)

Preface.

Foreword.

Acknowledgments.

1 Introduction.

1.1 Definition of Wireless Ad Hoc Networks.

1.2 Applications of Wireless Ad Hoc Networks.

1.3 Threats, Attacks, and Vulnerabilities.

1.3.1 Threats.

1.3.2 Vulnerabilities in Ad Hoc Networks.

1.3.3 Attacks.

1.4 Overview of the Book.

2 Basic Security Concepts.

2.1 Introduction.

2.2 Basic Concepts.

2.2.1 Attributes.

2.2.2 Cryptographic Primitives.

2.3 Modes of Operation.

2.4 Miscellaneous Properties.

2.4.1 One–Way Property of Hash Chains.

2.4.2 TESLA.

2.5 Summary.

3 Key Management.

3.1 Introduction.

3.2 Traditional Solution.

3.3 Solutions for Ad Hoc Networks.

3.3.1 Asymmetric Key–Based Approach.

3.3.2 Symmetric Key–Based Approach.

3.4 Summary.

4 Secure Routing.

4.1 Introduction.

4.1.1 Distance–Vector and Link–State Routing.

4.1.2 Proactive vs Reactive Routing.

4.2 Ad Hoc On–Demand Distance Vector.

4.2.1 Secure AODV.

4.2.2 Authenticated Routing for Ad Hoc Networks (ARAN).

4.2.3 Security–Aware Ad Hoc Routing.

4.3 Dynamic Source Routing Protocol.

4.3.1 Secure Routing Protocol.

4.3.2 Ariadne.

4.3.3 EndairA: A Provably Secure Routing Protocol.

4.4 Destination–Sequenced Distance–Vector Routing Protocol.

4.4.1 Secure Efficient Distance Vector Routing (SEAD).

4.4.2 SuperSEAD.

4.4.3 S–DSDV.

4.5 Optimized Link–State Routing Protocol.

4.5.1 Secure Extension to OLSR.

4.5.2 Secure Link–State Routing Protocol.

4.6 Anonymous Routing Protocols.

4.6.1 ANODR.

4.6.2 MASK.

4.7 Generic Attacks Against Routing.

4.7.1 Wormhole Attacks.

4.7.2 Rushing Attacks.

4.7.3 Sybil Attacks.

4.8 Summary.

5 Intrusion Detection Systems.

5.1 Introduction.

5.1.1 Traditional IDS Systems.

5.2 Unique IDS Challenges in MANET.

5.3 Threat Model.

5.4 Architecture for Intrusion Detection in MANET.

5.4.1 Noncollaborative Intrusion Detection System.

5.4.2 Cooperative Intrusion Detection.

5.4.3 Key Novel Concepts for Cooperative Intrusion Detection in MANET.

5.5 Evidence Collection.

5.5.1 Local Evidence.

5.5.2 Promiscuous Monitoring.

5.5.3 Evidence made Available by Other Nodes.

5.6 Detection of Specific Attacks.

5.6.1 Detection of Packet Dropping Attacks.

5.6.2 Detection of Attacks Against Routing Protocols.

5.7 Summary.

6 Policy Management.

6.1 Introduction.

6.2 Policy–Based Network Management.

6.2.1 Overview.

6.2.2 Architecture.

6.2.3 Policy Languages.

6.2.4 Distributed Policy Management Architecture.

6.2.5 IETF and DMTF Standardization Activities.

6.3 Application of Policy Management to Security Management.

6.3.1 Role–Based Access Control (RBAC).

6.3.2 Trust Management and the KeyNote System.

6.3.3 Firewall Management.

6.3.4 Policy Enforcement in a Wireless Ad Hoc Network.

6.4 Summary.

7 Secure Localization.

7.1 Introduction.

7.2 Localization.

7.2.1 Ranging.

7.2.2 Computation.

7.2.3 Attacks.

7.3 Secure Localization.

7.3.1 Distance Bounding Techniques.

7.3.2 Verifiable Multilateration.

7.3.3 Directional Antennae–Based Schemes.

7.3.4 Transmission Range Variation–Based Schemes.

7.3.5 Hybrid Schemes.

7.3.6 Malicious Beacons.

7.4 Summary.

8 Conclusions and Future Research.

8.1 Vehicular Networks.

8.1.1 Differences with MANET.

8.1.2 Open Problems and Solutions.

8.2 Summary.

Acronyms.

References.

Index.

FAROOQ ANJUM, PhD, is a senior scientist at Telcordia Technologies. He is also an adjunct professor at both the University of Pennsylvania and Stevens Institute of Technology. His research focuses on problems in diverse areas such as security in computer networks, wireless technologies, middleware, and next generation networks.

PETROS MOUCHTARIS, PhD, leads Telcordia′s research department in information assurance and security, including security for wireless ad hoc networks.

An examination of unique security problems posed by wireless ad hoc networks and their solutions

Security for Wireless Ad hoc Networks helps pave the way for the commercialization of wireless ad hoc networks by addressing the unique security risks that these networks raise. The author team offers a critical analysis of existing research findings and also discusses the direction and preliminary findings of ongoing research. Readers learn the advantages and disadvantages of the leading proposed security schemes. Moreover, readers are given the tools they need to assess the security implications of the protocols they design.

This text begins with a discussion outlining the threats, attacks, and vulnerabilities inherent in ad hoc wireless networks. Next, the authors introduce basic security concepts that serve as a foundation for the text′s examination of strategies and techniques forsecuring the network. Among the topics presented are:

  • Basic cryptography mechanisms
  • Key management
  • Secure routing
  • Intrusion detection
  • Security policy management
  • Secure location determination

Given both the promise and the risk associated with wireless ad hoc networks, this text is essential reading for all engineers and other professionals tasked with designing and securing wireless ad hoc networks.

Anjum, Farooq FAROOQ ANJUM, PhD, is a senior scientist at Telcor... więcej >


Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia