Security of self-organizing networks : MANET, WSN, WMN, VANET /: MANET, WSN, WMN, VANET. (©2011)
- Record Type:
- Book
- Title:
- Security of self-organizing networks : MANET, WSN, WMN, VANET /: MANET, WSN, WMN, VANET. (©2011)
- Main Title:
- Security of self-organizing networks : MANET, WSN, WMN, VANET
- Further Information:
- Note: Edited by Al-Sakib Khan Pathan.
- Other Names:
- Pathan, Al-Sakib Khan
- Contents:
- GENERAL TOPICS—SECURITY OF WIRELESS AND SELF-ORGANIZING NETWORKS Secure Device Association: Trends and Issues; Yasir Arfat Malkani, Dan Chalmers, and Ianwakeman; Securing Route and Path Integrity in Multihop Wireless Networks; Stephen Glass, Marius Portmann, and Vallipuram Muthukkumarasamy; Handling Security Threats to the RFID System of EPC Networks; Joaquin Garcia-Alfaro, Michel Barbeau, and Evangelos Kranakis; Survey of Anomaly Detection Algorithms: Toward Self-Learning Networks; Tarem Ahmed and Rumana Rahman; Reputation- and Trust-Based Systems forWireless Self-Organizing Networks; Jaydip Sen MOBILE AD-HOC NETWORK AND VEHICULAR AD-HOC NETWORK SECURITY; Security Threats in Mobile Ad Hoc Networks; Sevil Şen, John A. Clark, and Juan E. Tapiador; Key Management in Mobile Ad Hoc Networks; Sudip Misra and Sumit Goswami; Combating Against Security Attacks Against Mobile Ad Hoc Networks (MANETs); Zubair MD. Fadlullah, Tarik Taleb, and Marcus Schöller; Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Network: A Survey; Vikrant Gokhale, S.K. Ghosh, and Arobinda Gupta; Security in Vehicular Ad Hoc Networks; Vikas Singh Yadav, Sudip Misra, and Mozaffar Afaque; Toward a Robust Trust Model for Ensuring Security and Privacy in VANETs; Une Thoing Rosi and Syed Ishtiaque Ahmed; Sybil Attack in VANETs: Detection and Prevention; Jyoti Grover, M.S. Gaur, and V. Laxmi; ; WIRELESS SENSOR NETOWRK SECURITY Key Management Schemes of Wireless Sensor Networks: AGENERAL TOPICS—SECURITY OF WIRELESS AND SELF-ORGANIZING NETWORKS Secure Device Association: Trends and Issues; Yasir Arfat Malkani, Dan Chalmers, and Ianwakeman; Securing Route and Path Integrity in Multihop Wireless Networks; Stephen Glass, Marius Portmann, and Vallipuram Muthukkumarasamy; Handling Security Threats to the RFID System of EPC Networks; Joaquin Garcia-Alfaro, Michel Barbeau, and Evangelos Kranakis; Survey of Anomaly Detection Algorithms: Toward Self-Learning Networks; Tarem Ahmed and Rumana Rahman; Reputation- and Trust-Based Systems forWireless Self-Organizing Networks; Jaydip Sen MOBILE AD-HOC NETWORK AND VEHICULAR AD-HOC NETWORK SECURITY; Security Threats in Mobile Ad Hoc Networks; Sevil Şen, John A. Clark, and Juan E. Tapiador; Key Management in Mobile Ad Hoc Networks; Sudip Misra and Sumit Goswami; Combating Against Security Attacks Against Mobile Ad Hoc Networks (MANETs); Zubair MD. Fadlullah, Tarik Taleb, and Marcus Schöller; Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Network: A Survey; Vikrant Gokhale, S.K. Ghosh, and Arobinda Gupta; Security in Vehicular Ad Hoc Networks; Vikas Singh Yadav, Sudip Misra, and Mozaffar Afaque; Toward a Robust Trust Model for Ensuring Security and Privacy in VANETs; Une Thoing Rosi and Syed Ishtiaque Ahmed; Sybil Attack in VANETs: Detection and Prevention; Jyoti Grover, M.S. Gaur, and V. Laxmi; ; WIRELESS SENSOR NETOWRK SECURITY Key Management Schemes of Wireless Sensor Networks: A Survey; Syed Muhammad Khaliq-Ur-Rahman Raazi, Zeeshan Pervez, and Sungyoung Lee; Key Management Techniques for Wireless Sensor Networks: Practical and Theoretical Considerations; Effie Makri and Yannis C. Stamatiou; Bio-Inspired Intrusion Detection for Wireless Sensor Networks; Swapna Ghanekar, Nancy Alrajei, and Fatma Mili; Biological Inspired Autonomously Secure Mechanism for Wireless Sensor Networks; Kashif Saleem, Norsheila Fisal, Sharifah Hafizah Syed Ariffin, Sharifah Kamilah Syed Yusof, and Rozeha A. Rashid; Network Invading Attack on Key Pre-Distribution Schemes for Distributed Sensor Networks and Countermeasures; Thanh Dai Tran and Johnson I. Agbinya; Proactive Key Variation Owing to Dynamic Clustering (PERIODIC) in Sensor Networks; Gicheolwang and Gihwan Cho; Secure Routing Architectures Using Cross-Layer Information for Attack Avoidance (With Case Study on Wormhole Attack); James Harbin, Paul Mitchell, and David Pearce; Reputation-Based Trust Systems inWireless Sensor Networks; Hani Alzaid; MajorWorks on the Necessity and Implementations of PKC in WSNs: A Beginner’s Note; Al-Sakib Khan Pathan; ; WIRELESS MESH NETWORK SECURITY; Secure Access Control and Authentication in Wireless Mesh Networks; Bing He, Bin Xie, David Zhao, and Ranga Reddy; Misbehavior Detection in Wireless Mesh Networks; MD. Abdul Hamid and MD. Shariful Islam … (more)
- Publisher Details:
- Boca Raton : Auerbach Pub
- Publication Date:
- 2011
- Copyright Date:
- 2011
- Extent:
- 1 online resource (xviii, 620 pages), illustrations
- Subjects:
- 005.8
Ad hoc networks (Computer networks) -- Security measures
Self-organizing systems -- Security measures
Ad hoc networks (Computer networks)
Security measures
Self organizing systems
Electrical engineering
Engineering
Computer Science -- IT
COMPUTERS -- Internet -- Security
COMPUTERS -- Networking -- Security
COMPUTERS -- Security -- General
Electronic books - Languages:
- English
- ISBNs:
- 9781439819203
1439819203 - Related ISBNs:
- 9781439819197
143981919X - Notes:
- Note: Includes bibliographical references and index.
Note: Print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.147458
- Ingest File:
- 01_027.xml