1st Edition

Security for Multihop Wireless Networks

Edited By Shafiullah Khan, Jaime Lloret Mauri Copyright 2014
    538 Pages 142 B/W Illustrations
    by CRC Press

    538 Pages 142 B/W Illustrations
    by CRC Press

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.

    Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer.

    The text explains how to deal with black hole attacks in mobile ad hoc networks and describes how to detect misbehaving nodes in vehicular ad hoc networks. It identifies a pragmatic and energy efficient security layer for wireless sensor networks and covers the taxonomy of security protocols for wireless sensor communications.

    Exploring recent trends in the research and development of multihop network security, the book outlines possible defenses against packet-dropping attacks in wireless multihop ad hoc networks.Complete with expectations for the future in related areas, this is an ideal reference for researchers, industry professionals, and academics. Its comprehensive coverage also makes it suitable for use as a textbook in graduate-level electrical engineering programs.

    Taxonomy and Holistic Detection of Security Attacks in MANETs; P. García-Teodoro, L. Sánchez-Casado, and G. Maciá-Fernández
    Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks; Mohamed Amine Ferrag, Mehdi Nafa, and Salim Ghanemi
    Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks; A. S. Khan, N. Fisal, M. Esa, S. Kamilah, Suleiman Zubair, W. Maqbool, and Z. Abu Bakar
    Fighting against Black Hole Attacks in Mobile Ad Hoc Networks; Manuel D. Serrat-Olmos, Enrique Hernández-Orallo, Juan-Carlos Cano, Carlos T. Calafate, and Pietro Manzoni
    Mutual Authentication in IP Mobility-Enabled Multihop Wireless Networks; Sanaa Taha, Sandra Céspedes, and Xuemin (Sherman) Shen
    Detection of Misbehaving Nodes in Vehicular Ad-Hoc Network; Rajesh P. Barnwal and Soumya K. Ghosh

    Security Architecture for Multihop Wireless Sensor Networks; Ismail Mansour, Gerard Chalhoub, and Michel Misson
    Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach; Dauda Ayanda
    TinyKey: A Pragmatic and Energy Efficient Security Layer for Wireless Sensor Networks; Roberto Doriguzzi Corin, Giovanni Russello, and Elio Salvadori
    Secure Multipurpose Wireless Sensor Networks; Daniel Jacobi, Marc Fischlin, and Alejandro Buchmann
    Anomaly Detection in Wireless Sensor Networks: Challenges and Future Trends; Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu, and Surraya Khanum
    Taxonomy of Security Protocols for Wireless Sensor Communications; Jasone Astorga, Eduardo Jacob, Nerea Toledo, and Marivi Higuero

    Securing the Control of Euler–Lagrange Systems in Networked Environments with Model-Free Sliding Mode Control; Shuai Li, Yunpeng Wang, and Long Cheng
    Defenses against Packet-Dropping Attacks in Wireless Multihop Ad-Hoc Networks; L. Sánche z-Casado, R. Magán-Carrión, P. García-Teodoro, and J.E. Díaz-Verdejo
    Security Issues in Machine-to-Machine Communication; Shuo Chen and Maode Ma
    Authentication in Wireless Mesh Networks; Aymen Boudguiga and Maryline Laurent
    Wireless-Based Application-Layer Cross-Layer Design with Simultaneous Quality of Service and Security Support; Sasan Adibi
    Security, Trust, and Privacy in Opportunistic Multihop Wireless Networks; M. Bala Krishna


    Shafiullah Khan, Jaime Lloret Mauri