Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Wireless Network Security

Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9780387331126
Veröffentl:
2007
Seiten:
424
Autor:
Yang Xiao
Serie:
Signals and Communication Technology
eBook Typ:
PDF
eBook Format:
EPUB
Kopierschutz:
1 - PDF Watermark
Sprache:
Englisch
Beschreibung:

This timely volume, Wireless Network Security, provides broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications, and much more. The contributions identify various vulnerabilities in the physical layer, MAC layer, IP layer, transport layer, and application layer, and focus on ways for strengthening security mechanisms and services throughout the layers.
"Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, and discuss ways to strengthen security mechanisms and services in all these layers. The topics covered in this book include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications/multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking. TOC:High Performance Elliptic Curve Cryptographic Co-Processor.- An Adaptive Encryption Protocol in Mobile Computing.- Pre-Authentication and Authentication Models in Ad Hoc Networks.- Promoting Identity-Based Key Management in Wireless Ad Hoc Networks.- A Survey on Intrustion Detection in Mobile Ad Hoc Networks.- Intrusion Detection in Cellular Mobile Networks.- The Spread of Epidemics on Smartphones.- Cross-Domain Mobility-Adaptive Authentication.- AAA Architecture and Authentication for Wireless LAN Roaming.- An Experimental Study on Security Protocols in WLANs.- Security Issues in Wireless Sensor Networks used in Clinical Information Systems.- Key Management Schemes in Sensor Networks.- Secure Routing in Ad Hoc and Sensor Networks."
Security in General Wireless/Mobile Networks.- High Performance Elliptic Curve Cryptographic Co-processor.- An Adaptive Encryption Protocol in Mobile Computing.- Security in Ad Hoc Network.- Pre-Authentication and Authentication Models in Ad Hoc Networks.- Promoting Identity-Based Key Management in Wireless Ad Hoc Networks.- A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks.- Secure Routing in Wireless Ad-Hoc Networks.- A Survey on Intrusion Detection in Mobile Ad Hoc Networks.- Security in Mobile Cellular Networks.- Intrusion Detection in Cellular Mobile Networks.- The Spread of Epidemics on Smartphones.- Security in Wireless LANs.- Cross-Domain Mobility-Adaptive Authentication.- AAA Architecture and Authentication for Wireless Lan roaming.- An Experimental Study on Security Protocols in Wlans.- Security in Sensor Networks.- Security Issues in Wireless Sensor Networks Used in Clinical Information Systems.- Key Management Schemes in Sensor Networks.- Secure Routing in AD HOC and Sensor Networks.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.

Google Plus
Powered by Inooga