Security and Cooperation in Wireless Networks Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing

ISBN-10: 0521873711

ISBN-13: 9780521873710

Edition: 2007

List price: $108.00 Buy it from $16.45
eBook available
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: The current rate of deployment of wireless networks - whether cellular, LAN, Bluetooth, or sensor - is remarkable. Wireless systems are vulnerable to many kinds of attack, and the security features of fixed-line systems are not always applicable in the wireless arena. With ever-increasing amounts of data being carried on wireless netwrorks, security has become a major concern and an area of great commerical importance. This book presents the key features of wireless networks and discusses various techniques for ensuring secure communication. In particular, techniques for dealing with hacking and other forms of attack will be dealt with, as will cooperation in mulit-hop and ad hoc networks. Suitable for senior undergraduates and graduate students of electrical engineering and computer science. Given the breadth of coverage, it will also appeal to researchers and practitioners in the wireless industry.

Used Starting from $66.10
New Starting from $104.63
eBooks Starting from $84.00
Buy eBooks
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS PowerPoint® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $108.00
Copyright year: 2007
Publisher: Cambridge University Press
Publication date: 11/29/2007
Binding: Hardcover
Pages: 496
Size: 7.00" wide x 9.75" long x 1.00" tall
Weight: 2.530
Language: English

Levente Butty�n is an Associate Professor at the Department of Telecommunications, Budapest University of Technology and Economics (BME), Hungary.

Jean-Pierre Hubaux is a Professor at the School of Computer and Communication Sciences, Ecole Polytechnique F�d�rale de Lausanne (EPFL), Switzerland.

Preface
Acknowledgements
Introduction
The security of existing wireless networks
Vulnerabilities of wireless networks
Security requirements
How existing wireless networks are secured
Summary
To probe further
Questions
Upcoming wireless networks and new challenges
Introduction
Upcoming wireless networks
Trends and security challenges in wireless networks
Summary
To probe further
Questions
Trust assumptions and adversary models
About trust
Trust in the era of ubiquitous computing
Adversary
Summary
To probe further
Questions
Thwarting malicious behavior
Naming and addressing
The future of naming and addressing in the Internet
Attacks against naming and addressing
Protection techniques
Summary
To probe further
Questions
Establishment of security associations
Key establishment in sensor networks
Exploiting physical contact
Exploiting mobility
Exploiting the properties of vicinity and of the radio link
Revocation
Summary
To probe further
Questions
Securing neighbor discovery
The wormhole attack
Wormhole detection mechanisms
Summary
To probe further
Questions
Secure routing in multi-hop wireless networks
Routing protocols for mobile ad hoc networks
Attacks on ad hoc network routing protocols
Securing ad hoc network routing protocols
Provable security for ad hoc network routing protocols
Secure routing in sensor networks
Summary
To probe further
Questions
Privacy protection
Important privacy related notions and metrics
Privacy in RFID systems
Location privacy in vehicular networks
Privacy preserving routing in ad hoc networks
Summary
To probe further
Questions
Thwarting selfish behavior
Selfish behavior at the MAC layer of CSMA/CA
Operating principles of IEEE 802.11
Detecting selfish behavior in hotspots
Selfish behavior in pure ad hoc networks
Summary
To probe further
Questions
Selfishness in packet forwarding
Game theoretic model of packet forwarding
Meta-model
Analytical results
Simulation results
Summary
To probe further
Questions
Wireless operators in a shared spectrum
Multi-domain sensor networks
Border games in cellular operators
Summary
To probe further
Questions
Secure protocols for behavior enforcement
System model
Cooperation-optimal protocol
Protocol for the routing stage
Protocol for packet forwarding
Discussion
Summary
To probe further
Questions
Introduction to cryptographic algorithms and protocols
Introduction
Encryption
Hash functions
Message authentication codes
Digital signatures
Session key establishment protocols
Pseudo-random number generators
Advanced authentication techniques
To probe further
Questions
A tutorial on game theory for wireless networks
Introduction
Static games
Dynamic games
Repeated games
Discussion
Summary
To probe further
Questions
References
Index
×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×