Security For Wireless Ad Hoc Networks
商品資訊
ISBN13:9780471756880
出版社:John Wiley & Sons Inc
作者:Anjum
出版日:2007/02/05
裝訂/頁數:平裝/264頁
定價
:NT$ 5204 元優惠價
:
90 折 4684 元
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
商品簡介
作者簡介
名人/編輯推薦
目次
商品簡介
This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments.
An Instructor Support FTP site is available from the Wiley editorial board.
An Instructor Support FTP site is available from the Wiley editorial board.
作者簡介
FAROOQ ANJUM, PhD, is a senior scientist at Telcordia Technologies. He is also an adjunct professor at both the University of Pennsylvania and Stevens Institute of Technology. His research focuses on problems in diverse areas such as security in computer networks, wireless technologies, middleware, and next generation networks.
PETROS MOUCHTARIS, PhD, leads Telcordia's research department in information assurance and security, including security for wireless ad hoc networks.
PETROS MOUCHTARIS, PhD, leads Telcordia's research department in information assurance and security, including security for wireless ad hoc networks.
名人/編輯推薦
"…a first-class textbook on security in ad hoc networks." (Computing Reviews.com, May 17, 2007)
目次
Preface.
Foreword.
Acknowledgments.
1 Introduction.
1.1 Definition of Wireless Ad Hoc Networks.
1.2 Applications of Wireless Ad Hoc Networks.
1.3 Threats, Attacks, and Vulnerabilities.
1.3.1 Threats.
1.3.2 Vulnerabilities in Ad Hoc Networks.
1.3.3 Attacks.
1.4 Overview of the Book.
2 Basic Security Concepts.
2.1 Introduction.
2.2 Basic Concepts.
2.2.1 Attributes.
2.2.2 Cryptographic Primitives.
2.3 Modes of Operation.
2.4 Miscellaneous Properties.
2.4.1 One-Way Property of Hash Chains.
2.4.2 TESLA.
2.5 Summary.
3 Key Management.
3.1 Introduction.
3.2 Traditional Solution.
3.3 Solutions for Ad Hoc Networks.
3.3.1 Asymmetric Key-Based Approach.
3.3.2 Symmetric Key-Based Approach.
3.4 Summary.
4 Secure Routing.
4.1 Introduction.
4.1.1 Distance-Vector and Link-State Routing.
4.1.2 Proactive vs Reactive Routing.
4.2 Ad Hoc On-Demand Distance Vector.
4.2.1 Secure AODV.
4.2.2 Authenticated Routing for Ad Hoc Networks (ARAN).
4.2.3 Security-Aware Ad Hoc Routing.
4.3 Dynamic Source Routing Protocol.
4.3.1 Secure Routing Protocol.
4.3.2 Ariadne.
4.3.3 EndairA: A Provably Secure Routing Protocol.
4.4 Destination-Sequenced Distance-Vector Routing Protocol.
4.4.1 Secure Efficient Distance Vector Routing (SEAD).
4.4.2 SuperSEAD.
4.4.3 S-DSDV.
4.5 Optimized Link-State Routing Protocol.
4.5.1 Secure Extension to OLSR.
4.5.2 Secure Link-State Routing Protocol.
4.6 Anonymous Routing Protocols.
4.6.1 ANODR.
4.6.2 MASK.
4.7 Generic Attacks Against Routing.
4.7.1 Wormhole Attacks.
4.7.2 Rushing Attacks.
4.7.3 Sybil Attacks.
4.8 Summary.
5 Intrusion Detection Systems.
5.1 Introduction.
5.1.1 Traditional IDS Systems.
5.2 Unique IDS Challenges in MANET.
5.3 Threat Model.
5.4 Architecture for Intrusion Detection in MANET.
5.4.1 Noncollaborative Intrusion Detection System.
5.4.2 Cooperative Intrusion Detection.
5.4.3 Key Novel Concepts for Cooperative Intrusion Detection in MANET.
5.5 Evidence Collection.
5.5.1 Local Evidence.
5.5.2 Promiscuous Monitoring.
5.5.3 Evidence made Available by Other Nodes.
5.6 Detection of Specific Attacks.
5.6.1 Detection of Packet Dropping Attacks.
5.6.2 Detection of Attacks Against Routing Protocols.
5.7 Summary.
6 Policy Management.
6.1 Introduction.
6.2 Policy-Based Network Management.
6.2.1 Overview.
6.2.2 Architecture.
6.2.3 Policy Languages.
6.2.4 Distributed Policy Management Architecture.
6.2.5 IETF and DMTF Standardization Activities.
6.3 Application of Policy Management to Security Management.
6.3.1 Role-Based Access Control (RBAC).
6.3.2 Trust Management and the KeyNote System.
6.3.3 Firewall Management.
6.3.4 Policy Enforcement in a Wireless Ad Hoc Network.
6.4 Summary.
7 Secure Localization.
7.1 Introduction.
7.2 Localization.
7.2.1 Ranging.
7.2.2 Computation.
7.2.3 Attacks.
7.3 Secure Localization.
7.3.1 Distance Bounding Techniques.
7.3.2 Verifiable Multilateration.
7.3.3 Directional Antennae-Based Schemes.
7.3.4 Transmission Range Variation-Based Schemes.
7.3.5 Hybrid Schemes.
7.3.6 Malicious Beacons.
7.4 Summary.
8 Conclusions and Future Research.
8.1 Vehicular Networks.
8.1.1 Differences with MANET.
8.1.2 Open Problems and Solutions.
8.2 Summary.
Acronyms.
References.
Index.
Foreword.
Acknowledgments.
1 Introduction.
1.1 Definition of Wireless Ad Hoc Networks.
1.2 Applications of Wireless Ad Hoc Networks.
1.3 Threats, Attacks, and Vulnerabilities.
1.3.1 Threats.
1.3.2 Vulnerabilities in Ad Hoc Networks.
1.3.3 Attacks.
1.4 Overview of the Book.
2 Basic Security Concepts.
2.1 Introduction.
2.2 Basic Concepts.
2.2.1 Attributes.
2.2.2 Cryptographic Primitives.
2.3 Modes of Operation.
2.4 Miscellaneous Properties.
2.4.1 One-Way Property of Hash Chains.
2.4.2 TESLA.
2.5 Summary.
3 Key Management.
3.1 Introduction.
3.2 Traditional Solution.
3.3 Solutions for Ad Hoc Networks.
3.3.1 Asymmetric Key-Based Approach.
3.3.2 Symmetric Key-Based Approach.
3.4 Summary.
4 Secure Routing.
4.1 Introduction.
4.1.1 Distance-Vector and Link-State Routing.
4.1.2 Proactive vs Reactive Routing.
4.2 Ad Hoc On-Demand Distance Vector.
4.2.1 Secure AODV.
4.2.2 Authenticated Routing for Ad Hoc Networks (ARAN).
4.2.3 Security-Aware Ad Hoc Routing.
4.3 Dynamic Source Routing Protocol.
4.3.1 Secure Routing Protocol.
4.3.2 Ariadne.
4.3.3 EndairA: A Provably Secure Routing Protocol.
4.4 Destination-Sequenced Distance-Vector Routing Protocol.
4.4.1 Secure Efficient Distance Vector Routing (SEAD).
4.4.2 SuperSEAD.
4.4.3 S-DSDV.
4.5 Optimized Link-State Routing Protocol.
4.5.1 Secure Extension to OLSR.
4.5.2 Secure Link-State Routing Protocol.
4.6 Anonymous Routing Protocols.
4.6.1 ANODR.
4.6.2 MASK.
4.7 Generic Attacks Against Routing.
4.7.1 Wormhole Attacks.
4.7.2 Rushing Attacks.
4.7.3 Sybil Attacks.
4.8 Summary.
5 Intrusion Detection Systems.
5.1 Introduction.
5.1.1 Traditional IDS Systems.
5.2 Unique IDS Challenges in MANET.
5.3 Threat Model.
5.4 Architecture for Intrusion Detection in MANET.
5.4.1 Noncollaborative Intrusion Detection System.
5.4.2 Cooperative Intrusion Detection.
5.4.3 Key Novel Concepts for Cooperative Intrusion Detection in MANET.
5.5 Evidence Collection.
5.5.1 Local Evidence.
5.5.2 Promiscuous Monitoring.
5.5.3 Evidence made Available by Other Nodes.
5.6 Detection of Specific Attacks.
5.6.1 Detection of Packet Dropping Attacks.
5.6.2 Detection of Attacks Against Routing Protocols.
5.7 Summary.
6 Policy Management.
6.1 Introduction.
6.2 Policy-Based Network Management.
6.2.1 Overview.
6.2.2 Architecture.
6.2.3 Policy Languages.
6.2.4 Distributed Policy Management Architecture.
6.2.5 IETF and DMTF Standardization Activities.
6.3 Application of Policy Management to Security Management.
6.3.1 Role-Based Access Control (RBAC).
6.3.2 Trust Management and the KeyNote System.
6.3.3 Firewall Management.
6.3.4 Policy Enforcement in a Wireless Ad Hoc Network.
6.4 Summary.
7 Secure Localization.
7.1 Introduction.
7.2 Localization.
7.2.1 Ranging.
7.2.2 Computation.
7.2.3 Attacks.
7.3 Secure Localization.
7.3.1 Distance Bounding Techniques.
7.3.2 Verifiable Multilateration.
7.3.3 Directional Antennae-Based Schemes.
7.3.4 Transmission Range Variation-Based Schemes.
7.3.5 Hybrid Schemes.
7.3.6 Malicious Beacons.
7.4 Summary.
8 Conclusions and Future Research.
8.1 Vehicular Networks.
8.1.1 Differences with MANET.
8.1.2 Open Problems and Solutions.
8.2 Summary.
Acronyms.
References.
Index.
主題書展
更多
主題書展
更多書展購物須知
外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。
無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。
為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。
若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

