Verlag: Wireless Network Security. Springer

Verlag: Wireless Network Security. Springer

Now pay Easier and Secure using Paypal

Read more

E-books Shop
Verlag: Wireless Network Security

Wireless/mobile communications network technologies have been dramatically advanced
in recent years, inculding the third generation (3G) wireless networks, wireless
LANs, Ultra-wideband (UWB), ad hoc and sensor networks. However, wireless network
security is still a major impediment to further deployments of the wireless/mobile
networks. Security mechanisms in such networks are essential to protect data integrity
and confidentiality, access control, authentication, quality of service, user privacy, and
continuity of service. They are also critical to protect basic wireless network functionality.
This edited book covers the comprehensive research topics in wireless/mobile network
security, which include cryptographic co-processor, encryption, authentication,
key management, attacks and countermeasures, secure routing, secure medium access
control, intrusion detection, epidemics, security performance analysis, security issues in
applications, etc. It can serve as a useful reference for researchers, educators, graduate
students, and practitioners in the field of wireless/network network security.
The book contains 15 refereed chapters from prominent researchers working in
this area around the world. It is organized along five themes (parts) in security issues
for different wireless/mobile networks.

Part I: Security in General Wireless/Mobile Networks: 
Chapter 1 by Lutz and Hasan describes a high performance and optimal elliptic curve processor as
well as an optimal co-processor using Lopez and Dahab’s projective coordinate system. Chapter 2 by Lufei and Shi proposes an adaptive encryption protocol to dynamically choose a proper encryption algorithm based on application-specific requirements and device configurations.

Part II: Security inAdHoc Networks: 
The next five chapters focus on security in ad hoc networks.
Chapter 3 by Hoeper and Gong introduces a security framework for pre-authentication and authenticated models in ad hoc networks. Chapter 4 by Pan, Cai, and Shen promotes identity-based key management in ad hoc networks. Chapter 5 by Wu et al. provides a survey of attacks and countermeasures in ad hoc networks. Chapter 6 by Giruka and Singhal presents several routing protocols for ad-hoc networks, the security issues related to routing, and securing routing protocols in ad hoc networks. Chapter 7 by
Anantvalee and Wu classifies the architectures for intrusion detection systems in ad hoc networks.

Part III: Security in Mobile Cellular Networks: 
The next two chapters discuss security in mobile cellular networks. Chapter 8 by Sun, Xiao, and Wu
introduces intrusion detection systems in mobile cellular networks. 
Chapter 9 by Zheng et al. proposes an epidemics spread model for smartphones.

Part IV: Security inWireless LANs: 
The next three chapters study the security in wireless LANs. Chapter 10 by Kim and Shin focuses on cross-domain authentication over wireless local area networks, and proposes an enhanced
protocol called the Mobility-adjusted Authentication Protocol that performs mutual authentication and hierarchical key derivation. Chapter 11 by Shi et al. proposes Authentication, Authorization and Accounting (AAA) architecture and authentication for wireless LAN roaming. 
Chapter 12 by Agarwal and Wang studies the cross-layer interactions of security protocols in wireless LANs, and presents an experimental study.

PartV: Security in Sensor Networks: 
The last three chapters focus on security in sensor networks. Chapter 13 by Miˇsi´c and Miˇsi´c reviews confidentiality and integrity polices for clinical information systems and compares candidate
technologies IEEE 802.15.1 and IEEE 802.15.4 from the aspect of resilience of MAC and PHY layers to jamming and denial-of-service attacks. Chapter 14 by Rayi et al. provides a survey of key management schemes in sensor networks. 
The last chapter by Su, Xiao, and Boppana introduces security
attacks, and reviews the recent approaches of secure network routing protocols in both mobile ad hoc and sensor networks. Although the covered topics may not be an exhaustive representation of all the

security issues in wireless/mobile networks, they do represent a rich and useful sample of the strategies and contents.  This book has been made possible by the great efforts and contributions of many people. 
First of all, we would like to thank all the contributors for putting together
excellent chapters that are very comprehensive and informative. 
Second, we would like to thank all the reviewers for their valuable suggestions and comments which have greatly enhanced the quality of this book. 
Third, we would like to thank the staff members from Springer, for putting this book together. Finally, We would like to dedicate this book to our families.
Yang Xiao
Tuscaloosa, Alabama, USA
Xuemin (Sherman) Shen
Waterloo, Ontario, CANADA
Ding-Zhu Du

Richardson, Texas, USA

Preface vii
Yang Xiao, Xuemin Shen, and Ding-Zhu Du
Part I: Security in General Wireless/Mobile Networks
Chapter 1: High Performance Elliptic Curve Cryptographic Co-processor 3
Jonathan Lutz and M. Anwarul Hasan
Chapter 2: An Adaptive Encryption Protocol in Mobile Computing 43
Hanping Lufei and Weisong Shi
Part II: Security in Ad Hoc Network
Chapter 3: Pre-Authentication and Authentication Models in
Ad Hoc Networks 65
Katrin Hoeper and Guang Gong
Chapter 4: Promoting Identity-Based Key Management in
Wireless Ad Hoc Networks 83
Jianping Pan, Lin Cai, and Xuemin (Sherman) Shen
Chapter 5: A Survey of Attacks and Countermeasures in
Mobile Ad Hoc Networks 103
Bing Wu, Jianmin Chen, Jie Wu, and Mihaela Cardei
Chapter 6: Secure Routing in Wireless Ad-Hoc Networks 137
Venkata C. Giruka and Mukesh Singhal
Chapter 7: A Survey on Intrusion Detection in
Mobile Ad Hoc Networks 159
Tiranuch Anantvalee and Jie Wu
Part III: Security in Mobile Cellular Networks
Chapter 8: Intrusion Detection in Cellular Mobile Networks 183
Bo Sun, Yang Xiao, and Kui Wu
Chapter 9: The Spread of Epidemics on Smartphones 211
Bo Zheng, Yongqiang Xiong, Qian Zhang, and Chuang Lin
Part IV: Security in Wireless LANs
Chapter 10: Cross-Domain Mobility-Adaptive Authentication 245
Hahnsang Kim and Kang G. Shin
Chapter 11: AAA Architecture and Authentication
for Wireless LAN Roaming
Minghui Shi, Humphrey Rutagemwa, Xuemin (Sherman) Shen,
Jon W. Mark, Yixin Jiang, and Chuang Lin
Chapter 12: An Experimental Study on Security Protocols in WLANs 295
Avesh Kumar Agarwal and Wenye Wang
Part V: Security in Sensor Networks
Chapter 13: Security Issues inWireless Sensor Networks
used in Clinical Information Systems 325
Jelena Misˇic´ and Vojislav B. Misˇic´
Chapter 14: Key Management Schemes in Sensor Networks 341
Venkata Krishna Rayi, Yang Xiao, Bo Sun, Xiaojiang (James) Du, and Fei Hu
Chapter 15: Secure Routing in Ad Hoc and Sensor Networks 381
Xu (Kevin) Su, Yang Xiao, and Rajendra V. Boppana
About the Editors 403
Index 407


E-book Shop

Purchase Now !
Just with Paypal

Product details
 File Size
 3,955 KB
 418 p
 File Type
 PDF format
 2007 Springer Science
 +Business Media, LLC  

═════ ═════