Skip to content

Security and Cooperation in Wireless Networks Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing

Best in textbook rentals since 2012!

ISBN-10: 0521873711

ISBN-13: 9780521873710

Edition: 2007

Authors: Levente Butty�n, Jean-Pierre Hubaux

List price: $90.99
Shipping box This item qualifies for FREE shipping.
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

The current rate of deployment of wireless networks - whether cellular, LAN, Bluetooth, or sensor - is remarkable. Wireless systems are vulnerable to many kinds of attack, and the security features of fixed-line systems are not always applicable in the wireless arena. With ever-increasing amounts of data being carried on wireless netwrorks, security has become a major concern and an area of great commerical importance. This book presents the key features of wireless networks and discusses various techniques for ensuring secure communication. In particular, techniques for dealing with hacking and other forms of attack will be dealt with, as will cooperation in mulit-hop and ad hoc networks.…    
Customers also bought

Book details

List price: $90.99
Copyright year: 2007
Publisher: Cambridge University Press
Publication date: 11/29/2007
Binding: Hardcover
Pages: 496
Size: 7.05" wide x 10.00" long x 1.10" tall
Weight: 2.530
Language: English

Levente Butty�n is an Associate Professor at the Department of Telecommunications, Budapest University of Technology and Economics (BME), Hungary.

Jean-Pierre Hubaux is a Professor at the School of Computer and Communication Sciences, Ecole Polytechnique F�d�rale de Lausanne (EPFL), Switzerland.

Preface
Acknowledgements
Introduction
The security of existing wireless networks
Vulnerabilities of wireless networks
Security requirements
How existing wireless networks are secured
Summary
To probe further
Questions
Upcoming wireless networks and new challenges
Introduction
Upcoming wireless networks
Trends and security challenges in wireless networks
Summary
To probe further
Questions
Trust assumptions and adversary models
About trust
Trust in the era of ubiquitous computing
Adversary
Summary
To probe further
Questions
Thwarting malicious behavior
Naming and addressing
The future of naming and addressing in the Internet
Attacks against naming and addressing
Protection techniques
Summary
To probe further
Questions
Establishment of security associations
Key establishment in sensor networks
Exploiting physical contact
Exploiting mobility
Exploiting the properties of vicinity and of the radio link
Revocation
Summary
To probe further
Questions
Securing neighbor discovery
The wormhole attack
Wormhole detection mechanisms
Summary
To probe further
Questions
Secure routing in multi-hop wireless networks
Routing protocols for mobile ad hoc networks
Attacks on ad hoc network routing protocols
Securing ad hoc network routing protocols
Provable security for ad hoc network routing protocols
Secure routing in sensor networks
Summary
To probe further
Questions
Privacy protection
Important privacy related notions and metrics
Privacy in RFID systems
Location privacy in vehicular networks
Privacy preserving routing in ad hoc networks
Summary
To probe further
Questions
Thwarting selfish behavior
Selfish behavior at the MAC layer of CSMA/CA
Operating principles of IEEE 802.11
Detecting selfish behavior in hotspots
Selfish behavior in pure ad hoc networks
Summary
To probe further
Questions
Selfishness in packet forwarding
Game theoretic model of packet forwarding
Meta-model
Analytical results
Simulation results
Summary
To probe further
Questions
Wireless operators in a shared spectrum
Multi-domain sensor networks
Border games in cellular operators
Summary
To probe further
Questions
Secure protocols for behavior enforcement
System model
Cooperation-optimal protocol
Protocol for the routing stage
Protocol for packet forwarding
Discussion
Summary
To probe further
Questions
Introduction to cryptographic algorithms and protocols
Introduction
Encryption
Hash functions
Message authentication codes
Digital signatures
Session key establishment protocols
Pseudo-random number generators
Advanced authentication techniques
To probe further
Questions
A tutorial on game theory for wireless networks
Introduction
Static games
Dynamic games
Repeated games
Discussion
Summary
To probe further
Questions
References
Index