1. Trang chủ
  2. » Công Nghệ Thông Tin

security for wireless ad hoc networks

266 325 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 266
Dung lượng 4,22 MB

Nội dung

www.sharexxx.net - free books & magazines SECURITY FOR WIRELESS AD HOC NETWORKS Farooq Anjum and Petros Mouchtaris SECURITY FOR WIRELESS AD HOC NETWORKS [...]... of wireless nirvana Technology under development for wireless ad hoc networks is enabling our march toward this end goal; however the security concerns in wireless networking remains a serious impediment to widespread adoption The underlying radio communication medium for wireless networks is a big vulnerability that can be exploited to launch several attacks against wireless networks In addition, wireless. .. knowledge in this area Unfortunately there has not been any work done along these lines Our effort in this book is focused on this approach of dissemination of known knowledge in the area of security in wireless ad hoc networks To our knowledge, this book is the first book that focuses exclusively on the topic of security for wireless ad hoc networks The topic of security in wireless ad hoc networks itself is... destinations Networks that support the ad hoc architecture are typically called wireless ad hoc networks or mobile ad hoc networks (MANET) We will use these two terms interchangeably throughout the book Such networks are typically assumed to be self-forming and selfhealing This is because the typical applications of such networks require nodes to form networks quickly without any human intervention Given the wireless. .. security of the network Such solutions are not applicable for wireless ad hoc networks on account of the features of these networks The increased vulnerabilities of ad hoc networks and the limitations of existing security solutions designed for wireline networks will become clearer throughout the book Ad hoc networks that make extensive use of wireless links are vulnerable to several types of attack... the use of wireless ad hoc networks, defense organizations might be unable to guarantee the safety of their personnel in battlefield scenarios and users will be liable for actions that they never committed Therefore, security of such wireless ad hoc networks is an important area that needs to be addressed if such networks are to be widely used There are two ways of doing this One way is for the researchers... in wireless ad hoc networks with an emphasis on security and assurance In the last decade researchers have explored many potential applications of wireless ad hoc networks The research has ranged from basic theoretical investigations to prototypes and demonstrations The largest body of work has been in the government arena The Department of Defense has invested seriously in exploiting wireless ad hoc. .. an IP address or verify that a particular address is not already used For example, in the case of duplicate address detection (DAD), a danger exists that a malicious node may pretend to be using any of the addresses chosen by an incoming host, thus denying the incoming host the right to join the network Constraints existing in ad hoc networks also add to the vulnerabilities For example, such networks. .. focus on the topic of xi xii PREFACE securing network protocols in wireless ad hoc networks Note that networking in ad hoc networks is concerned with enabling two devices with wireless interfaces to communicate with each other The objective of this book is to make the readers aware of the fundamentals of the area of security of wireless networks as well as the open problems This will hopefully spur much... rapidly with limited human effort Several other applications of MANETs are also being considered For example, municipalities are considering deployment of wireless ad hoc networks (in the form of so called mesh networks) for offering broadband access to end users including employees of the municipality, first responders, and even residents of the municipality Such networks have already been deployed in a... problems Additionally, researchers focusing on novel security schemes for wireless ad hoc networks that would like to become aware of existing research should also profit from the description of various schemes in this book This will let them know about what is out there and what is needed Finally, this should also be a valuable book for researchers focusing on applications of wireless ad hoc networks . magazines SECURITY FOR WIRELESS AD HOC NETWORKS Farooq Anjum and Petros Mouchtaris SECURITY FOR WIRELESS AD HOC NETWORKS

Ngày đăng: 25/03/2014, 12:07

TỪ KHÓA LIÊN QUAN