112,99 €
versandkostenfrei*

inkl. MwSt.
Sofort lieferbar
56 °P sammeln
    Gebundenes Buch

Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, and discuss ways to strengthen security mechanisms and services in all these layers. The topics covered in this book include intrusion detection, secure PHY/MAC/routing…mehr

Produktbeschreibung
Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, and discuss ways to strengthen security mechanisms and services in all these layers. The topics covered in this book include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications/multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.
  • Produktdetails
  • Signals and Communication Technology
  • Verlag: Springer / Springer US / Springer, Berlin
  • Artikelnr. des Verlages: 11409366
  • Erscheinungstermin: 5. Juni 2007
  • Englisch
  • Abmessung: 241mm x 160mm x 28mm
  • Gewicht: 827g
  • ISBN-13: 9780387280400
  • ISBN-10: 0387280405
  • Artikelnr.: 20891284
Inhaltsangabe
Security in General Wireless/Mobile Networks.- High Performance Elliptic Curve Cryptographic Co-processor.- An Adaptive Encryption Protocol in Mobile Computing.- Security in Ad Hoc Network.- Pre-Authentication and Authentication Models in Ad Hoc Networks.- Promoting Identity-Based Key Management in Wireless Ad Hoc Networks.- A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks.- Secure Routing in Wireless Ad-Hoc Networks.- A Survey on Intrusion Detection in Mobile Ad Hoc Networks.- Security in Mobile Cellular Networks.- Intrusion Detection in Cellular Mobile Networks.- The Spread of Epidemics on Smartphones.- Security in Wireless LANs.- Cross-Domain Mobility-Adaptive Authentication.- AAA Architecture and Authentication for Wireless Lan roaming.- An Experimental Study on Security Protocols in Wlans.- Security in Sensor Networks.- Security Issues in Wireless Sensor Networks Used in Clinical Information Systems.- Key Management Schemes in Sensor Networks.- Secure Routing in AD HOC and Sensor Networks.