Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 266 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
266
Dung lượng
4,22 MB
Nội dung
www.sharexxx.net - free books & magazines
SECURITY FOR WIRELESS
AD HOC NETWORKS
Farooq Anjum and Petros Mouchtaris
SECURITY FOR WIRELESS
AD HOC NETWORKS
[...]... of wireless nirvana Technology under development forwirelessadhocnetworks is enabling our march toward this end goal; however the security concerns in wireless networking remains a serious impediment to widespread adoption The underlying radio communication medium forwirelessnetworks is a big vulnerability that can be exploited to launch several attacks against wirelessnetworks In addition, wireless. .. knowledge in this area Unfortunately there has not been any work done along these lines Our effort in this book is focused on this approach of dissemination of known knowledge in the area of security in wirelessadhocnetworks To our knowledge, this book is the first book that focuses exclusively on the topic of securityforwirelessadhocnetworks The topic of security in wirelessadhocnetworks itself is... destinations Networks that support the adhoc architecture are typically called wirelessadhocnetworks or mobile adhocnetworks (MANET) We will use these two terms interchangeably throughout the book Such networks are typically assumed to be self-forming and selfhealing This is because the typical applications of such networks require nodes to form networks quickly without any human intervention Given the wireless. .. security of the network Such solutions are not applicable forwirelessadhocnetworks on account of the features of these networks The increased vulnerabilities of adhocnetworks and the limitations of existing security solutions designed for wireline networks will become clearer throughout the book Adhocnetworks that make extensive use of wireless links are vulnerable to several types of attack... the use of wirelessadhoc networks, defense organizations might be unable to guarantee the safety of their personnel in battlefield scenarios and users will be liable for actions that they never committed Therefore, security of such wireless adhocnetworks is an important area that needs to be addressed if such networks are to be widely used There are two ways of doing this One way is for the researchers... in wirelessadhocnetworks with an emphasis on security and assurance In the last decade researchers have explored many potential applications of wirelessadhocnetworks The research has ranged from basic theoretical investigations to prototypes and demonstrations The largest body of work has been in the government arena The Department of Defense has invested seriously in exploiting wirelessad hoc. .. an IP address or verify that a particular address is not already used For example, in the case of duplicate address detection (DAD), a danger exists that a malicious node may pretend to be using any of the addresses chosen by an incoming host, thus denying the incoming host the right to join the network Constraints existing in adhocnetworks also add to the vulnerabilities For example, such networks. .. focus on the topic of xi xii PREFACE securing network protocols in wirelessadhocnetworks Note that networking in adhocnetworks is concerned with enabling two devices with wireless interfaces to communicate with each other The objective of this book is to make the readers aware of the fundamentals of the area of security of wirelessnetworks as well as the open problems This will hopefully spur much... rapidly with limited human effort Several other applications of MANETs are also being considered For example, municipalities are considering deployment of wirelessadhocnetworks (in the form of so called mesh networks) for offering broadband access to end users including employees of the municipality, first responders, and even residents of the municipality Such networks have already been deployed in a... problems Additionally, researchers focusing on novel security schemes forwirelessadhocnetworks that would like to become aware of existing research should also profit from the description of various schemes in this book This will let them know about what is out there and what is needed Finally, this should also be a valuable book for researchers focusing on applications of wirelessadhocnetworks . magazines SECURITY FOR WIRELESS AD HOC NETWORKS Farooq Anjum and Petros Mouchtaris SECURITY FOR WIRELESS AD HOC NETWORKS