Amazon cover image
Image from Amazon.com
Image from Google Jackets

Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing / Levente Buttya?n, Jean-Pierre Hubaux.

Contributor(s): Material type: TextTextPublication details: Cambridge, UK ; New York : Cambridge University Press, 2008.Description: xvii, 485 p. : ill. ; 26 cmISBN:
  • 0521873711
Subject(s): DDC classification:
  • 005.8   22
Contents:
Summary: The current rate of deployment of wireless networks - whether cellular, LAN, Bluetooth, or sensor - is remarkable. Wireless systems are vulnerable to many kinds of attack, and the security features of fixed-line systems are not always applicable in the wireless arena. With ever-increasing amounts of data being carried on wireless networks, security has become a major concern and an area of great commercial importance. This book presents the key features of wireless networks and discusses various techniques for ensuring secure communication. In particular, techniques for dealing with hacking and other forms of attack will be dealt with, as will cooperation in multi-hop and ad hoc networks. It is suitable for senior undergraduates and graduate students of electrical engineering and computer science. Given the breadth of coverage, it will also appeal to researchers and practitioners in the wireless industry.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Books Books Main library General Stacks 005.8 / BU.S 2008 (Browse shelf(Opens below)) 1 Available 000390
Books Books Main library General Stacks 005.8 / BU.S 2008 (Browse shelf(Opens below)) 2 Available 002731

Includes bibliographical references (p. 458-478) and index.

Introduction -- The security of existing wireless networks -- Upcoming wireless networks and new challenges -- Trust assumptions and adversary models -- Thwarting Malicious Behavior -- Naming and addressing -- Establishment of security associations -- Securing neighbor discovery -- Secure routing in multi-hop wireless networks -- Privacy protection -- Thwarting Selfish Behavio -- Selfish behavior at the MAC layer of CSMA/CA -- Selfishness in packet forwarding -- Wireless operators in a shared spectrum -- Secure protocols for behavior enforcement; Appendice -- Introduction to cryptographic algorithms and protocols -- tutorial on game theory for wireless networks

The current rate of deployment of wireless networks - whether cellular, LAN, Bluetooth, or sensor - is remarkable. Wireless systems are vulnerable to many kinds of attack, and the security features of fixed-line systems are not always applicable in the wireless arena. With ever-increasing amounts of data being carried on wireless networks, security has become a major concern and an area of great commercial importance. This book presents the key features of wireless networks and discusses various techniques for ensuring secure communication. In particular, techniques for dealing with hacking and other forms of attack will be dealt with, as will cooperation in multi-hop and ad hoc networks. It is suitable for senior undergraduates and graduate students of electrical engineering and computer science. Given the breadth of coverage, it will also appeal to researchers and practitioners in the wireless industry.

1

There are no comments on this title.

to post a comment.