Ebook: Wireless Network Security
- Tags: Communications Engineering Networks, Data Encryption, Computer Communication Networks, The Computer Industry, Personal Computing
- Series: Signals and Communication Technology
- Year: 2007
- Publisher: Springer US
- Edition: 1
- Language: English
- pdf
This timely volume, Wireless Network Security, provides broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications, and much more. The contributions identify various vulnerabilities in the physical layer, MAC layer, IP layer, transport layer, and application layer, and focus on ways for strengthening security mechanisms and services throughout the layers.
The book includes 15 rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless and mobile security related issues.
This timely volume, Wireless Network Security, provides broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications, and much more. The contributions identify various vulnerabilities in the physical layer, MAC layer, IP layer, transport layer, and application layer, and focus on ways for strengthening security mechanisms and services throughout the layers.
The book includes 15 rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless and mobile security related issues.
This timely volume, Wireless Network Security, provides broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications, and much more. The contributions identify various vulnerabilities in the physical layer, MAC layer, IP layer, transport layer, and application layer, and focus on ways for strengthening security mechanisms and services throughout the layers.
The book includes 15 rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless and mobile security related issues.
Content:
Front Matter....Pages i-viii
Front Matter....Pages 1-1
High Performance Elliptic Curve Cryptographic Co-processor....Pages 3-42
An Adaptive Encryption Protocol in Mobile Computing....Pages 43-62
Front Matter....Pages 63-63
Pre-Authentication and Authentication Models in Ad Hoc Networks....Pages 65-82
Promoting Identity-Based Key Management in Wireless Ad Hoc Networks....Pages 83-102
A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks....Pages 103-135
Secure Routing in Wireless Ad-Hoc Networks....Pages 137-158
A Survey on Intrusion Detection in Mobile Ad Hoc Networks....Pages 159-180
Front Matter....Pages 181-181
Intrusion Detection in Cellular Mobile Networks....Pages 183-210
The Spread of Epidemics on Smartphones....Pages 211-241
Front Matter....Pages 243-243
Cross-Domain Mobility-Adaptive Authentication....Pages 245-271
AAA Architecture and Authentication for Wireless Lan roaming....Pages 273-294
An Experimental Study on Security Protocols in Wlans....Pages 295-322
Front Matter....Pages 323-323
Security Issues in Wireless Sensor Networks Used in Clinical Information Systems....Pages 325-340
Key Management Schemes in Sensor Networks....Pages 341-380
Secure Routing in AD HOC and Sensor Networks....Pages 381-402
Back Matter....Pages 403-422
This timely volume, Wireless Network Security, provides broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications, and much more. The contributions identify various vulnerabilities in the physical layer, MAC layer, IP layer, transport layer, and application layer, and focus on ways for strengthening security mechanisms and services throughout the layers.
The book includes 15 rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless and mobile security related issues.
Content:
Front Matter....Pages i-viii
Front Matter....Pages 1-1
High Performance Elliptic Curve Cryptographic Co-processor....Pages 3-42
An Adaptive Encryption Protocol in Mobile Computing....Pages 43-62
Front Matter....Pages 63-63
Pre-Authentication and Authentication Models in Ad Hoc Networks....Pages 65-82
Promoting Identity-Based Key Management in Wireless Ad Hoc Networks....Pages 83-102
A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks....Pages 103-135
Secure Routing in Wireless Ad-Hoc Networks....Pages 137-158
A Survey on Intrusion Detection in Mobile Ad Hoc Networks....Pages 159-180
Front Matter....Pages 181-181
Intrusion Detection in Cellular Mobile Networks....Pages 183-210
The Spread of Epidemics on Smartphones....Pages 211-241
Front Matter....Pages 243-243
Cross-Domain Mobility-Adaptive Authentication....Pages 245-271
AAA Architecture and Authentication for Wireless Lan roaming....Pages 273-294
An Experimental Study on Security Protocols in Wlans....Pages 295-322
Front Matter....Pages 323-323
Security Issues in Wireless Sensor Networks Used in Clinical Information Systems....Pages 325-340
Key Management Schemes in Sensor Networks....Pages 341-380
Secure Routing in AD HOC and Sensor Networks....Pages 381-402
Back Matter....Pages 403-422
....