Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 861 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
861
Dung lượng
19,18 MB
Nội dung
[...]... also security protocols in standards The chapters of this book are authoritatively contributed by a group of internationally renowned experts onwirelesssecurity They are organized in four sections: • • • • Section I: Security Fundamentals Section II: Security in 3G/B3G/4G Section III: Security in Ad Hoc and Sensor Networks Section IV: Security in Wireless PAN/LAN/MAN Section I introduces the basic concepts... a comprehensive survey and taxonomy of existing secure localization and verification schemes for wireless sensor networks Chapter XXXVIII Resilience Against False Data Injection Attack in Wireless Sensor Networks 628 Miao Ma, The Hong Kong University of Science and Technology, Hong Kong One of severe security threats in wireless sensor network is false data injection attack, that is, the compromised... different wireless technologies existing Each wireless technology has its own architecture, algorithms, and protocols Different wireless technologies have their own application areas and different security concerns, requirements, and solutions To this end, we want to bring up the HandbookofResearchonWirelessSecurity to serve as a single comprehensive reference in the field of wireless security. .. implementations are presented The first implementation is suitable for high-speed applications while the second one is suitable for applications with constrained silicon area resources The architecture permits a wide variety of implementation tradeoffs Different implementations have been introduced and each specific application can choose the appropriate speed-area trade-off implementation The implementations... authentication and access control, intrusion detection and tolerance, secure location services, privacy and anonymity, secure routing, resilience against different types of attacks, and so forth Section IV exploits the security problems in wireless PAN/LAN/MAN Nowadays we have continuously growing markets for the wireless PANs, wireless LANs, and wireless MANs, but there is a big black hole in the security of. .. Chapter VI Intrusion and Anomaly Detection in Wireless Networks 78 Amel Meddeb Makhlouf, University of the 7th of November at Carthage, Tunisia Noureddine Boudriga, University of the 7th of November at Carthage, Tunisia The broadcast nature of wireless networks and the mobility features created new kinds of intrusions and anomalies taking profit ofwireless vulnerabilities Because of the radio... pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) significant researchers’ attention, due to its innate capabilities of instant communication in many time and mission critical applications However, its natural advantages of networking in civilian and military environments make it vulnerable to security threats Support for anonymity in MANET is orthogonal to a critical security. .. special thank to the families and friends for their constant encouragement, patience, and understanding throughout this project In closing, we wish to thank all of the authors for their insights, excellent contributions, and professional cooperation to this handbook Co-Editors for HandbookofResearchonWirelessSecurity Yan Zhang, Ph.D Simula Research Laboratory, Norway Jun Zheng, Ph.D CUNY, USA... single source of information onsecurity threats and requirements, authentication technologies, security encapsulation, and key management protocols relevant to wireless LANs and MANs Chapter XLVII End-to-End (E2E) Security Approach in WiMAX: A Security Technical Overview for Corporate Multimedia Applications 747 Sasan Adibi, University of Waterloo, Canada Gordon B Agnew, University of Waterloo,... the fact that the medium of signal transmission is accessible to everyone, there are a few extra security considerations applied to 802.16e These extra features include PKMv2, PKM-EAP authentication method, AES encryption wrapping, and so forth The common security features of 802.16d and 802.16e are discussed in this chapter, as well as the highlights of the security comparisons between other broadband . Handbook of Research on Wireless Security Yan Zhang Simula Research Laboratory, Norway Jun Zheng City University of New York, USA Miao Ma Hong Kong University of Science and Technology, Hong. Cataloging-in-Publication Data Handbook of research on wireless security / Yan Zhang, Jun Zheng, and Miao Ma, editors. p. cm. Summary: “This book combines research from esteemed experts on security issues. the development of theories to allow reasoning about detection, wireless cooperation, and response to incidents, and (b) the development of wireless intrusion and anomaly detection systems that