Security and Cooperation in Wireless Networks
The current rate of deployment of wireless networks - whether cellular, LAN, Bluetooth, or sensor - is remarkable. Wireless systems are vulnerable to many kinds of attack, and the security features of fixed-line systems are not always applicable in the wireless arena. With ever-increasing amounts of data being carried on wireless networks, security has become a major concern and an area of great commercial importance. This book presents the key features of wireless networks and discusses various techniques for ensuring secure communication. In particular, techniques for dealing with hacking and other forms of attack will be dealt with, as will cooperation in multi-hop and ad hoc networks. It is suitable for senior undergraduates and graduate students of electrical engineering and computer science. Given the breadth of coverage, it will also appeal to researchers and practitioners in the wireless industry.
- Covers techniques for protecting against hacking, and for cooperation in multi-hop and ad hoc networks
- Covers the fundamental issues encompassing the full breadth of security in wireless networks
- The tutorial nature of the book makes it more user-friendly
Reviews & endorsements
"The authors offer both theoretical analysis and real-world examples...homework problems are provided at the end of each chapter, making the work suitable for classroom adoption."
F.A. Cassara, Choice
"Security and Cooperation in Wireless Networks achieves its goal of explaining how to prevent malicious and selfish behavior. It is a well written book that can serve as an inspiration for future research. Therefore, we can wholeheartedly recommend this book most of all for postgraduate students and lecturers, but also for researchers working in the field of wireless security.
IEEE Communications Magazine, March 2009
Product details
November 2007Hardback
9780521873710
496 pages
254 × 179 × 28 mm
1.136kg
140 b/w illus. 80 exercises
Available
Table of Contents
- Part I. Introduction:
- 1. The security of existing wireless networks
- 2. Upcoming wireless networks and new challenges
- 3. Trust assumptions and adversary models
- Part II. Thwarting Malicious Behavior:
- 4. Naming and addressing
- 5. Establishment of security associations
- 6. Securing neighbor discovery
- 7. Secure routing in multi-hop wireless networks
- 8. Privacy protection
- Part III. Thwarting Selfish Behavior:
- 9. Selfish behavior at the MAC layer of CSMA/CA
- 10. Selfishness in packet forwarding
- 11. Wireless operators in a shared spectrum
- 12. Secure protocols for behavior enforcement
- Appendices: A. Introduction to cryptographic algorithms and protocols
- B. A tutorial on game theory for wireless networks
- Bibliography
- Index.