000 | 02905cam a2200301 a 4500 | ||
---|---|---|---|
008 | 080326s2008 enka b 001 0 eng | ||
010 | _a2008295154 | ||
020 | _a0521873711 | ||
035 | _a(Sirsi) u346 | ||
040 |
_aEG-CaNU _cEG-CaNU _dEG-CaNU |
||
042 | _ancode | ||
082 | 0 | 0 |
_a005.8 _2 22 |
245 | 1 | 0 |
_aSecurity and cooperation in wireless networks : _b thwarting malicious and selfish behavior in the age of ubiquitous computing / _c Levente Buttya?n, Jean-Pierre Hubaux. |
260 |
_aCambridge, UK ; _a New York : _b Cambridge University Press, _c 2008. |
||
300 |
_axvii, 485 p. : _b ill. ; _c 26 cm. |
||
504 | _aIncludes bibliographical references (p. 458-478) and index. | ||
505 | 0 | _aIntroduction -- The security of existing wireless networks -- Upcoming wireless networks and new challenges -- Trust assumptions and adversary models -- Thwarting Malicious Behavior -- Naming and addressing -- Establishment of security associations -- Securing neighbor discovery -- Secure routing in multi-hop wireless networks -- Privacy protection -- Thwarting Selfish Behavio -- Selfish behavior at the MAC layer of CSMA/CA -- Selfishness in packet forwarding -- Wireless operators in a shared spectrum -- Secure protocols for behavior enforcement; Appendice -- Introduction to cryptographic algorithms and protocols -- tutorial on game theory for wireless networks | |
520 | _aThe current rate of deployment of wireless networks - whether cellular, LAN, Bluetooth, or sensor - is remarkable. Wireless systems are vulnerable to many kinds of attack, and the security features of fixed-line systems are not always applicable in the wireless arena. With ever-increasing amounts of data being carried on wireless networks, security has become a major concern and an area of great commercial importance. This book presents the key features of wireless networks and discusses various techniques for ensuring secure communication. In particular, techniques for dealing with hacking and other forms of attack will be dealt with, as will cooperation in multi-hop and ad hoc networks. It is suitable for senior undergraduates and graduate students of electrical engineering and computer science. Given the breadth of coverage, it will also appeal to researchers and practitioners in the wireless industry. | ||
630 | 0 | 0 |
_aCIT. _914 |
650 | 0 |
_aWireless communication systems _x Security measures. _9445 |
|
650 | 0 |
_aComputer networks _x Security measures. _96832 |
|
700 | 1 |
_aButty?n, Levente. _96833 |
|
700 | 1 |
_aHubaux, Jean-Pierre. _96834 |
|
596 | _a1 | ||
999 |
_c2454 _d2454 |