| |
| |
Preface | |
| |
| |
Acknowledgements | |
| |
| |
| |
Introduction | |
| |
| |
| |
The security of existing wireless networks | |
| |
| |
| |
Vulnerabilities of wireless networks | |
| |
| |
| |
Security requirements | |
| |
| |
| |
How existing wireless networks are secured | |
| |
| |
| |
Summary | |
| |
| |
| |
To probe further | |
| |
| |
| |
Questions | |
| |
| |
| |
Upcoming wireless networks and new challenges | |
| |
| |
| |
Introduction | |
| |
| |
| |
Upcoming wireless networks | |
| |
| |
| |
Trends and security challenges in wireless networks | |
| |
| |
| |
Summary | |
| |
| |
| |
To probe further | |
| |
| |
| |
Questions | |
| |
| |
| |
Trust assumptions and adversary models | |
| |
| |
| |
About trust | |
| |
| |
| |
Trust in the era of ubiquitous computing | |
| |
| |
| |
Adversary | |
| |
| |
| |
Summary | |
| |
| |
| |
To probe further | |
| |
| |
| |
Questions | |
| |
| |
| |
Thwarting malicious behavior | |
| |
| |
| |
Naming and addressing | |
| |
| |
| |
The future of naming and addressing in the Internet | |
| |
| |
| |
Attacks against naming and addressing | |
| |
| |
| |
Protection techniques | |
| |
| |
| |
Summary | |
| |
| |
| |
To probe further | |
| |
| |
| |
Questions | |
| |
| |
| |
Establishment of security associations | |
| |
| |
| |
Key establishment in sensor networks | |
| |
| |
| |
Exploiting physical contact | |
| |
| |
| |
Exploiting mobility | |
| |
| |
| |
Exploiting the properties of vicinity and of the radio link | |
| |
| |
| |
Revocation | |
| |
| |
| |
Summary | |
| |
| |
| |
To probe further | |
| |
| |
| |
Questions | |
| |
| |
| |
Securing neighbor discovery | |
| |
| |
| |
The wormhole attack | |
| |
| |
| |
Wormhole detection mechanisms | |
| |
| |
| |
Summary | |
| |
| |
| |
To probe further | |
| |
| |
| |
Questions | |
| |
| |
| |
Secure routing in multi-hop wireless networks | |
| |
| |
| |
Routing protocols for mobile ad hoc networks | |
| |
| |
| |
Attacks on ad hoc network routing protocols | |
| |
| |
| |
Securing ad hoc network routing protocols | |
| |
| |
| |
Provable security for ad hoc network routing protocols | |
| |
| |
| |
Secure routing in sensor networks | |
| |
| |
| |
Summary | |
| |
| |
| |
To probe further | |
| |
| |
| |
Questions | |
| |
| |
| |
Privacy protection | |
| |
| |
| |
Important privacy related notions and metrics | |
| |
| |
| |
Privacy in RFID systems | |
| |
| |
| |
Location privacy in vehicular networks | |
| |
| |
| |
Privacy preserving routing in ad hoc networks | |
| |
| |
| |
Summary | |
| |
| |
| |
To probe further | |
| |
| |
| |
Questions | |
| |
| |
| |
Thwarting selfish behavior | |
| |
| |
| |
Selfish behavior at the MAC layer of CSMA/CA | |
| |
| |
| |
Operating principles of IEEE 802.11 | |
| |
| |
| |
Detecting selfish behavior in hotspots | |
| |
| |
| |
Selfish behavior in pure ad hoc networks | |
| |
| |
| |
Summary | |
| |
| |
| |
To probe further | |
| |
| |
| |
Questions | |
| |
| |
| |
Selfishness in packet forwarding | |
| |
| |
| |
Game theoretic model of packet forwarding | |
| |
| |
| |
Meta-model | |
| |
| |
| |
Analytical results | |
| |
| |
| |
Simulation results | |
| |
| |
| |
Summary | |
| |
| |
| |
To probe further | |
| |
| |
| |
Questions | |
| |
| |
| |
Wireless operators in a shared spectrum | |
| |
| |
| |
Multi-domain sensor networks | |
| |
| |
| |
Border games in cellular operators | |
| |
| |
| |
Summary | |
| |
| |
| |
To probe further | |
| |
| |
| |
Questions | |
| |
| |
| |
Secure protocols for behavior enforcement | |
| |
| |
| |
System model | |
| |
| |
| |
Cooperation-optimal protocol | |
| |
| |
| |
Protocol for the routing stage | |
| |
| |
| |
Protocol for packet forwarding | |
| |
| |
| |
Discussion | |
| |
| |
| |
Summary | |
| |
| |
| |
To probe further | |
| |
| |
| |
Questions | |
| |
| |
| |
Introduction to cryptographic algorithms and protocols | |
| |
| |
| |
Introduction | |
| |
| |
| |
Encryption | |
| |
| |
| |
Hash functions | |
| |
| |
| |
Message authentication codes | |
| |
| |
| |
Digital signatures | |
| |
| |
| |
Session key establishment protocols | |
| |
| |
| |
Pseudo-random number generators | |
| |
| |
| |
Advanced authentication techniques | |
| |
| |
| |
To probe further | |
| |
| |
| |
Questions | |
| |
| |
| |
A tutorial on game theory for wireless networks | |
| |
| |
| |
Introduction | |
| |
| |
| |
Static games | |
| |
| |
| |
Dynamic games | |
| |
| |
| |
Repeated games | |
| |
| |
| |
Discussion | |
| |
| |
| |
Summary | |
| |
| |
| |
To probe further | |
| |
| |
| |
Questions | |
| |
| |
References | |
| |
| |
Index | |