Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
Person/Organisation
Subjects(RVK)
Keywords
Access
  • 1
    Online Resource
    Online Resource
    Hoboken, N.J. :Wiley-Interscience,
    UID:
    almafu_9959328633302883
    Format: 1 online resource (xv, 247 pages) : , illustrations
    ISBN: 9780470118467 , 0470118466 , 9780470118474 , 0470118474
    Content: This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments. An Instructor Support FTP site is available from the Wiley editorial board.
    Note: Cover -- TOC36;Contents -- Preface -- Foreword -- Acknowledgments -- CH36;1 Introduction -- 146;1 Definition of Wireless Ad Hoc Networks -- 146;2 Applications of Wireless Ad Hoc Networks -- 146;3 Threats44; Attacks44; and Vulnerabilities -- 146;346;1 Threats -- 146;346;2 Vulnerabilities in Ad Hoc Networks -- 146;346;3 Attacks -- 146;4 Overview of the Book -- CH36;2 Basic Security Concepts -- 246;1 Introduction -- 246;2 Basic Concepts -- 246;246;1 Attributes -- 246;246;2 Cryptographic Primitives -- 246;3 Modes of Operation -- 246;4 Miscellaneous Properties -- 246;446;1 One45;Way Property of Hash Chains -- 246;446;2 TESLA -- 246;5 Summary -- CH36;3 Key Management -- 346;1 Introduction -- 346;2 Traditional Solution -- 346;3 Solutions for Ad Hoc Networks -- 346;346;1 Asymmetric Key45;Based Approach -- 346;346;2 Symmetric Key45;Based Approach -- 346;4 Summary -- CH36;4 Secure Routing -- 446;1 Introduction -- 446;146;1 Distance45;Vector and Link45;State Routing -- 446;146;2 Proactive vs Reactive Routing -- 446;2 Ad Hoc On45;Demand Distance Vector -- 446;246;1 Secure AODV -- 446;246;2 Authenticated Routing for Ad Hoc Networks 40;ARAN41; -- 446;246;3 Security45;Aware Ad Hoc Routing -- 446;3 Dynamic Source Routing Protocol -- 446;346;1 Secure Routing Protocol -- 446;346;2 Ariadne -- 446;346;3 EndairA58; A Provably Secure Routing Protocol -- 446;4 Destination45;Sequenced Distance45;Vector Routing Protocol -- 446;446;1 Secure Efficient Distance Vector Routing 40;SEAD41; -- 446;446;2 SuperSEAD -- 446;446;3 S45;DSDV -- 446;5 Optimized Link45;State Routing Protocol -- 446;546;1 Secure Extension to OLSR -- 446;546;2 Secure Link45;State Routing Protocol -- 446;6 Anonymous Routing Protocols -- 446;646;1 ANODR -- 446;646;2 MASK -- 446;7 Generic Attacks Against Routing -- 446;746;1 Wormhole Attacks -- 446;746;2 Rushing Attacks -- 446;746;3 Sybil Attacks -- 446;8 Summary -- CH36;5 Intrusion Detection Systems -- 546;1 Introduction -- 546;146;1 Traditional IDS Systems -- 546;2 Unique IDS Challenges in MANET -- 546;3 Threat Model -- 546;4 Architecture for Intrusion Detection in MANET -- 546;446;1 Noncollaborative Intrusion Detection System -- 546;446;2 Cooperative Intrusion Detection -- 546;446;3 Key Novel Concepts for Cooperative Intrusion Detection in MANET -- 546;5 Evidence Collection -- 546;546;1 Local Evidence -- 546;546;2 Promiscuous Monitoring -- 546;546;3 Evidence made Available by Other Nodes -- 546;6 Detection of Specific Attacks -- 546;646;1 Detection of Packet Dropping Attacks -- 546;646;2 Detection of Attacks Against Routing Protocols -- 546;7 Summary -- CH36;6 Policy Management -- 646;1 Introduction -- 646;2 Policy45;Based Network Management -- 646;246;1 Overview -- 646;246;2 Architecture -- 646;246;3 Policy Languages -- 646;246;4 Distributed Policy Management Architecture -- 646;246;5 IETF and DMTF Standardization Activities -- 646;3 Application of Policy Management to Security Management -- 646;346;1 Role45;Based Access Control 40;RBAC41; -- 646;346;2 Trust Management and the KeyNote System -- 646;346;3 Firewall Management -- 646;346;4.
    Additional Edition: Print version: Anjum, Farooq. Security for wireless ad hoc networks. Hoboken, N.J. : Wiley-Interscience, ©2007 ISBN 0471756881
    Additional Edition: ISBN 9780471756880
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Electronic books. ; Electronic books. ; Electronic books. ; Electronic books. ; Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9780470110454?
Did you mean 9780470118429?
Did you mean 9780470110478?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages