This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.
This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireles...
Welcome to the proceedings of the 2010 International Conference on Future Gene- tion Communication and Networking (FGCN 2010) - one of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010). FGCN brings together researchers from academia and industry as well as practit- ners to share ideas, problems and solutions relating to the multifaceted aspects of communication and networking, including their links to computational sciences, mathematics and information technology. In total, 1,630 papers were submitted to FGIT 2010 from 30...
Welcome to the proceedings of the 2010 International Conference on Future Gene- tion Communication and Networking (FGCN 2010) - one of the partnering ...
This title describes state-of-the-art approaches and novel technologies for communication networks in smart grids. Examining how contemporary grid networks are developed and deployed, it discusses how communication and networking will play significant roles in building future smart grids.
This title describes state-of-the-art approaches and novel technologies for communication networks in smart grids. Examining how contemporary grid net...