Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Wireless Network Security

 eBook
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9780387331126
Einband:
eBook
Seiten:
424
Autor:
Yang Xiao
Serie:
Springer Signals and Communication Technology
eBook Typ:
PDF
eBook Format:
EPUB
Kopierschutz:
1 - PDF Watermark
Sprache:
Englisch
Beschreibung:

This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.
"Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, and discuss ways to strengthen security mechanisms and services in all these layers. The topics covered in this book include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications/multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking. TOC:High Performance Elliptic Curve Cryptographic Co-Processor.- An Adaptive Encryption Protocol in Mobile Computing.- Pre-Authentication and Authentication Models in Ad Hoc Networks.- Promoting Identity-Based Key Management in Wireless Ad Hoc Networks.- A Survey on Intrustion Detection in Mobile Ad Hoc Networks.- Intrusion Detection in Cellular Mobile Networks.- The Spread of Epidemics on Smartphones.- Cross-Domain Mobility-Adaptive Authentication.- AAA Architecture and Authentication for Wireless LAN Roaming.- An Experimental Study on Security Protocols in WLANs.- Security Issues in Wireless Sensor Networks used in Clinical Information Systems.- Key Management Schemes in Sensor Networks.- Secure Routing in Ad Hoc and Sensor Networks."
Security in General Wireless/Mobile Networks.- High Performance Elliptic Curve Cryptographic Co-processor.- An Adaptive Encryption Protocol in Mobile Computing.- Security in Ad Hoc Network.- Pre-Authentication and Authentication Models in Ad Hoc Networks.- Promoting Identity-Based Key Management in Wireless Ad Hoc Networks.- A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks.- Secure Routing in Wireless Ad-Hoc Networks.- A Survey on Intrusion Detection in Mobile Ad Hoc Networks.- Security in Mobile Cellular Networks.- Intrusion Detection in Cellular Mobile Networks.- The Spread of Epidemics on Smartphones.- Security in Wireless LANs.- Cross-Domain Mobility-Adaptive Authentication.- AAA Architecture and Authentication for Wireless Lan roaming.- An Experimental Study on Security Protocols in Wlans.- Security in Sensor Networks.- Security Issues in Wireless Sensor Networks Used in Clinical Information Systems.- Key Management Schemes in Sensor Networks.- Secure Routing in AD HOC and Sensor Networks.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.

Google Plus
Powered by Inooga