Normal view MARC view ISBD view

Security of self-organizing networks : MANET, WSN, WMN, VANET / editor, Al-Sakib Khan Pathan.

Contributor(s): Pathan, Al-Sakib Khan.
Material type: materialTypeLabelBookPublisher: Boca Raton : Auerbach Publications, 2011Description: 1 online resource (638 pages).Content type: text Media type: computer Carrier type: online resourceISBN: 9780429094392; 9781466547766.Subject(s): Ad hoc networks (Computer networks) -- Security measures | Self organizaing systems -- Security measuresAdditional physical formats: Print version: : No titleDDC classification: 005.8 Online resources: Click here to view.
Contents:
part Part I: GENERAL TOPICS-SECURITY OF WIRELESS AND SELF-ORGANIZINGNETWORKS -- chapter 1 Secure Device Association: Trends and Issues / YASIR ARFAT MALKANI, DAN CHALMERS, and IAN WAKEMAN -- chapter 2 Securing Route and Path Integrity in Multihop Wireless Networks / STEPHEN GLASS -- chapter 3 Handling Security Threats to the RFID System of EPC Networks / JOAQUIN GARCIA-ALFARO, MICHEL BARBEAU, and EVANGELOS KRANAKIS -- chapter 4 Survey of Anomaly Detection Algorithms: Toward Self-Learning Networks / TAREM AHMED -- chapter 5 Reputation- and Trust-Based Systems for Wireless Self-Organizing Networks / JAYDIP SEN -- part Part II: MOBILE AD HOC NETWORK ANDVEHICULAR AD HOCNETWORK SECURITY -- chapter 6 Security Threats in Mobile Ad Hoc Networks / SEVIL S¸EN, JOHN A. CLARK, and JUAN E. TAPIADOR -- chapter 7 Key Management in Mobile Ad Hoc Networks / SUDIP MISRA -- chapter 8 Combating against Security Attacks against Mobile Ad Hoc Networks (MANETs) / ZUBAIR MUHAMMAD FADLULLAH, TARIK TALEB, and MARCUS SCHÖLLER -- chapter 9 Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks: A Survey / VIKRANT GOKHALE, S.K. GHOSH, and AROBINDA GUPTA -- chapter 10 Security in Vehicular Ad Hoc Networks / VIKAS SINGH YADAV, SUDIP MISRA, and MOZAFFAR AFAQUE -- chapter 11 Toward a Robust Trust Model for Ensuring Security and Privacy in VANETs / UNE THOING ROSI and SYED ISHTIAQUE AHMED -- chapter 12 Sybil Attack in VANETs: Detection and Prevention / JYOTI GROVER, M.S. GAUR, and V. LAXMI -- part Part III: WIRELESS SENSORNETWORK SECURITY -- chapter 13 Key Management Schemes of Wireless Sensor Networks: A Survey / SYED MUHAMMAD KHALIQ-UR-RAHMAN RAAZI, ZEESHAN PERVEZ, and SUNGYOUNG LEE -- chapter 14 Key Management Techniques for Wireless Sensor Networks: Practical and Theoretical Considerations / EFFIE MAKRI -- chapter 15 Bio-Inspired Intrusion Detection for Wireless Sensor Networks / SWAPNA GHANEKAR -- chapter 16 Biological Inspired Autonomously Secure Mechanism for Wireless Sensor Networks / KASHIF SALEEM, NORSHEILA FISAL, SHARIFAH HAFIZAH SYED ARIFFIN, SHARIFAH KAMILAH SYED YUSOF, and ROZEHA A. RASHID -- chapter 17 Controlled Link Establishment Attack on Key Pre-Distribution Schemes for Distributed Sensor Networks and Countermeasures / THANH DAI TRAN and JOHNSON I. AGBINYA -- chapter 18 Proactive Key Variation Owing to Dynamic Clustering (PERIODIC) in Sensor Networks / GICHEOL WANG -- chapter 19 Secure Routing Architectures Using Cross-Layer Information for Attack Avoidance (with Case Study on Wormhole Attacks) / JAMES HARBIN -- chapter 20 Reputation-Based Trust Systems in Wireless Sensor Networks / HANI ALZAID -- chapter 21 Major Works on the Necessity and Implementations of PKC in WSNs: A Beginner's Note / AL-SAKIB KHAN PATHAN -- part Part IV: WIRELESS MESH NETWORK SECURITY -- chapter 22 Secure Access Control and Authentication in Wireless Mesh Networks / BING HE -- chapter 23 Misbehavior Detection in Wireless Mesh Networks / MD. ABDUL HAMID and MD. SHARIFUL ISLAM.
    average rating: 0.0 (0 votes)
No physical items for this record

part Part I: GENERAL TOPICS-SECURITY OF WIRELESS AND SELF-ORGANIZINGNETWORKS -- chapter 1 Secure Device Association: Trends and Issues / YASIR ARFAT MALKANI, DAN CHALMERS, and IAN WAKEMAN -- chapter 2 Securing Route and Path Integrity in Multihop Wireless Networks / STEPHEN GLASS -- chapter 3 Handling Security Threats to the RFID System of EPC Networks / JOAQUIN GARCIA-ALFARO, MICHEL BARBEAU, and EVANGELOS KRANAKIS -- chapter 4 Survey of Anomaly Detection Algorithms: Toward Self-Learning Networks / TAREM AHMED -- chapter 5 Reputation- and Trust-Based Systems for Wireless Self-Organizing Networks / JAYDIP SEN -- part Part II: MOBILE AD HOC NETWORK ANDVEHICULAR AD HOCNETWORK SECURITY -- chapter 6 Security Threats in Mobile Ad Hoc Networks / SEVIL S¸EN, JOHN A. CLARK, and JUAN E. TAPIADOR -- chapter 7 Key Management in Mobile Ad Hoc Networks / SUDIP MISRA -- chapter 8 Combating against Security Attacks against Mobile Ad Hoc Networks (MANETs) / ZUBAIR MUHAMMAD FADLULLAH, TARIK TALEB, and MARCUS SCHÖLLER -- chapter 9 Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks: A Survey / VIKRANT GOKHALE, S.K. GHOSH, and AROBINDA GUPTA -- chapter 10 Security in Vehicular Ad Hoc Networks / VIKAS SINGH YADAV, SUDIP MISRA, and MOZAFFAR AFAQUE -- chapter 11 Toward a Robust Trust Model for Ensuring Security and Privacy in VANETs / UNE THOING ROSI and SYED ISHTIAQUE AHMED -- chapter 12 Sybil Attack in VANETs: Detection and Prevention / JYOTI GROVER, M.S. GAUR, and V. LAXMI -- part Part III: WIRELESS SENSORNETWORK SECURITY -- chapter 13 Key Management Schemes of Wireless Sensor Networks: A Survey / SYED MUHAMMAD KHALIQ-UR-RAHMAN RAAZI, ZEESHAN PERVEZ, and SUNGYOUNG LEE -- chapter 14 Key Management Techniques for Wireless Sensor Networks: Practical and Theoretical Considerations / EFFIE MAKRI -- chapter 15 Bio-Inspired Intrusion Detection for Wireless Sensor Networks / SWAPNA GHANEKAR -- chapter 16 Biological Inspired Autonomously Secure Mechanism for Wireless Sensor Networks / KASHIF SALEEM, NORSHEILA FISAL, SHARIFAH HAFIZAH SYED ARIFFIN, SHARIFAH KAMILAH SYED YUSOF, and ROZEHA A. RASHID -- chapter 17 Controlled Link Establishment Attack on Key Pre-Distribution Schemes for Distributed Sensor Networks and Countermeasures / THANH DAI TRAN and JOHNSON I. AGBINYA -- chapter 18 Proactive Key Variation Owing to Dynamic Clustering (PERIODIC) in Sensor Networks / GICHEOL WANG -- chapter 19 Secure Routing Architectures Using Cross-Layer Information for Attack Avoidance (with Case Study on Wormhole Attacks) / JAMES HARBIN -- chapter 20 Reputation-Based Trust Systems in Wireless Sensor Networks / HANI ALZAID -- chapter 21 Major Works on the Necessity and Implementations of PKC in WSNs: A Beginner's Note / AL-SAKIB KHAN PATHAN -- part Part IV: WIRELESS MESH NETWORK SECURITY -- chapter 22 Secure Access Control and Authentication in Wireless Mesh Networks / BING HE -- chapter 23 Misbehavior Detection in Wireless Mesh Networks / MD. ABDUL HAMID and MD. SHARIFUL ISLAM.

There are no comments for this item.

Log in to your account to post a comment.