Security in Wireless Ad Hoc and Sensor Networks / Edition 1

Hardcover (Print)
Buy New
Buy New from BN.com
$117.19
Used and New from Other Sellers
Used and New from Other Sellers
from $64.55
Usually ships in 1-2 business days
(Save 52%)
Other sellers (Hardcover)
  • All (10) from $64.55   
  • New (8) from $99.35   
  • Used (2) from $64.55   

Overview

This book provides an in-depth guide to security in wireless ad hoc and sensor networks

Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and counter measures in wireless ad hoc, sensor and mesh networks, and briefly presents the standards on related topics. The authors offer a clear exposition of various challenges and solutions in this field including bootstrapping, key distribution and exchange, authentication issues, privacy, anonymity and tamper resilience.

Key Features:

  • Introduces the fundamentals and key issues of the new technologies followed by comprehensive presentation on security attacks and counter measures
  • Covers Denial of Service (DoS) attacks, hardware aspects of secure wireless ad hoc and sensor networks and secure routing
  • Contains information on cryptographic primitives and electronic warfare
  • Includes problems at the end of each chapter to enhance learning.

This book is well suited for graduate students in computer, electrical and communications engineering and computer science departments, researchers in academia and industry, as well as C4I engineers and officers in the military. Wireless network designers for internet service providers and mobile communications operators will also find this book very useful.

Read More Show Less

Product Details

  • ISBN-13: 9780470027486
  • Publisher: Wiley
  • Publication date: 3/23/2009
  • Edition description: New Edition
  • Edition number: 1
  • Pages: 280
  • Product dimensions: 6.70 (w) x 9.80 (h) x 0.90 (d)

Meet the Author

Erdal Çayırcı graduated from the Army Academy in 1986 and from the Royal Military Academy, Sandhurst in 1989. He received his MS degree from the Middle East Technical University and a PhD from Bogazici University both in computer engineering in 1995 and 2000, respectively. He retired from the army when he was a colonel in 2005. He was an Associate Professor at Istanbul Technical University, Yeditepe University and the Naval Sciences and Engineering Institute between 2001 and 2005. Also in 2001, he was a visiting researcher for the Broadband and Wireless Networking Laboratory and a visiting lecturer at the School of Electrical and Computer Engineering, Georgia Institute of Technology. He is currently Chief, CAX Support Branch in NATO’s JointWarfare Center in Stavanger, Norway, and also a professor in the Electrical and Computer Engineering Department of the University of Stavanger. His research interests include military constructive simulation, sensor networks, mobile communications and tactical communications. Professor Çayırcı has acted as an editor of the journals IEEE Transactions on Mobile Computing, Ad Hoc Networks and Wireless Networks, and has guest edited four special issues of Computer Networks, Ad Hoc Networks and Special Topics in Mobile Networking and Applications (MONET). He received the 2002 IEEE Communications Society Best Tutorial Paper Award for his paper entitled ‘A Survey on Sensor Networks’ published in the IEEE Communications Magazine in August 2002, the Fikri Gayret Award from the Turkish Chief of General Staff in 2003, the Innovation of the Year Award from the Turkish Navy in 2005 and the Excellence Award in ITEC in 2006.

Chunming Rong received his bachelors, masters and PhD degrees in Computer Science from the University of Bergen in Norway in 1993, 1995 and 1998, respectively. In 1995–1998, he was a research fellow at the University of Bergen. In 2001–2003, he was a post-doctoral researcher funded by Simula Research Laboratory. Currently, he is a Professor and chair of the computer science section at the University of Stavanger. He has also served as an adjunct Professor at the University Graduate Centre, University of Oslo, since 2005. Professor Rong was given the ConocoPhilips Communication Award (Norway) in 2007. His paper ‘New Infinite Families of 3-Designs from Preparata Codes over Z4 was awarded Editor’s Choice in Discrete Mathematics in 1999. He is an associate editor of the International Journal of Computer Science & Applications (IJCSA) and served on the editorial board of the International Journal of Mobile Communications (IJMC) between 2003 and 2006. For the IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS), he was program chair in 2007 in Canada and general chair in 2008. For the International Conference on Autonomic and Trusted Computing (ATC), he was award chair in 2007 in Hong Kong and general chair in 2008 in Norway. For the International Conference on Ubiquitous Intelligence and Computing (UIC), he was general chair in 2008 in Norway. Professor Rong was chairman of the board of the Foundation of the Norwegian Computer Science Conference (NIK) from 2005–2007, a board member of the Norwegian Information Security Network (NISNet) from 2007–2011 and a member of the Norwegian Informatics Council (Nasjonalt fagråd for informatikk). He has also been a member of the board for the ‘ICT Security and Vulnerability (IKT-SoS)’ program at the Research Council of Norway. He also currently serves in the workgroup for Information Security in Integrated Operation at the Norwegian Oil Industry Association (OLF). As project manager, he has received grants from the Research Council of Norway for the projects ‘Integration of Data Processing in Oil and Gas Drilling and Completion’ for 2008–2010, ‘Secure and Reliable Wireless and Ad Hoc Communications (SWACOM)’ for 2006–2009 and ‘Integrated IP-based Services for Smart Home Environment (IS-Home)’ for 2007–2010. The Norwegian Information Security Network (NISNet) also receives annual funding from the Research Council of Norway. His research interests include computer and network security, wireless communications, cryptography, identity management, electronic payment, coding theory and semantic web technology.

Read More Show Less

Table of Contents

About the Authors.

Preface.

Acknowledgements.

List of Acronyms.

Part One Wireless Ad Hoc, Sensor and Mesh Networking.

1 Introduction.

1.1 Information Security.

1.2 Scope of the Book.

1.3 Structure of the Book.

1.4 Electronic Resources for the Book.

1.5 Review Questions.

2 Wireless Ad Hoc, Sensor and Mesh Networks.

2.1 Ad Hoc Networks and Applications.

2.2 Sensor and Actuator Networks.

2.3 Mesh Networks.

2.4 Tactical Communications and Networks.

2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks.

.6 Review Questions.

3 The Wireless Medium.

3.1 Wireless Channel Fundamentals and Security.

3.2 Advanced Radio Technologies.

3.3 Review Questions.

4 Medium Access and Error Control.

4.1 Medium Access Control.

4.2 Error Control.

4.3 Wireless Metropolitan Area Networks.

4.4 Wireless Local Area Networks.

4.5 Wireless Personal Area Networks.

4.6 Review Questions.

5 Routing.

5.1 Internet Protocol and Mobile IP.

5.2 Routing in Wireless Ad Hoc Networks.

5.3 Routing in Wireless Sensor and Actuator Networks.

5.4 Review Questions.

6 Reliability, Flow and Congestion Control.

6.1 Reliability.

6.2 Flow and Congestion Control.

6.3 Review Questions.

7 Other Challenges and Security Aspects.

7.1 Localization and Positioning.

7.2 Time Synchronization.

7.3 Addressing.

7.4 Data Aggregation and Fusion.

7.5 Data Querying.

7.6 Coverage.

7.7 Mobility Management.

7.8 Cross-layer Design.

7.9 Review Questions.

Part Two Security in Wireless Ad Hoc, Sensor and Mesh Networking.

8 Security Attacks in Ad Hoc, Sensor and Mesh Networks.

8.1 Security Attacks.

8.2 Attackers.

8.3 Security Goals.

8.4 Review Questions.

9 Cryptography.

9.1 Symmetric Encryption.

9.2 Asymmetric Encryption.

9.3 Hash Functions and Message Authentication Code.

9.4 Cascading Hashing.

9.5 Review Questions.

10 Challenges and Solutions: Basic Issues.

10.1 Bootstrapping Security in Ad Hoc Networks.

10.2 Bootstrapping Security in Sensor Networks.

10.3 Key Distribution, Exchange and Management.

10.4 Authentication Issues.

10.5 Integrity.

10.6 Review Questions.

11 Challenges and Solutions: Protection.

11.1 Privacy and Anonymity.

11.2 Intrusion Detection.

11.3 Defense Against Traffic Analysis.

11.4 Access Control and Secure Human–Computer Interaction.

11.5 Software-Based Anti-Tamper Techniques.

11.6 Tamper Resilience: Hardware Protection.

11.7 Availability and Plausibility.

11.8 Review Questions.

12 Secure Routing.

12.1 Defense Against Security Attacks in Ad Hoc Routing.

12.2 Secure Ad Hoc Routing Protocols.

12.3 Further Reading.

12.4 Review Questions.

13 Specific Challenges and Solutions.

13.1 SPINS: Security Protocols for Sensor Networks.

13.2 Quarantine Region Scheme for Spam Attacks.

13.3 Secure Charging and Rewarding Scheme.

13.4 Secure Node Localization.

13.5 Secure Time Synchronization.

13.6 Secure Event and Event Boundary Detection.

13.7 Review Questions.

14 Information Operations and Electronic Warfare.

14.1 Electronic Support.

14.2 Electronic Attack.

14.3 Electronic Protection.

14.4 Review Questions.

15 Standards.

15.1 X.800 and RFC 2828.

15.2 Wired Equivalent Privacy (WEP).

15.3 Wi-Fi Protected Access (WPA).

References.

Index.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)