1st Edition

Security in Distributed, Grid, Mobile, and Pervasive Computing

By Yang Xiao Copyright 2007
    440 Pages 107 B/W Illustrations
    by Auerbach Publications

    Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems.

    A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security.

    With more and more vital information stored on computers, security professionals need to know how to combat threats and complications. Offering strategies to tackle these issues, this book provides essential security information for researchers, practitioners, educators, and graduate students in the field.

    Security for Content Distribution Networks-Concepts,
    Systems and Research Issues
    Elisa Bertino and Yunhua Koglin

    Key Management and Agreement in Distributed Systems
    Venkata C. Giruka, Saikat Chakrabarti, and Mukesh Singhal

    Securing Design Patterns for Distributed Systems
    Eduardo B. Fernandez and Maria M. Larrondo-Petrie

    Pragmatic Security for ConstrainedWireless Networks
    Phillip G. Bradford, Benjamin M. Grizzell, Graylin T. Jay, and Janet Truitt Jenkins

    Authentication in Wireless Networks
    Saikat Chakrabarti, Venkata C. Giruka, and Mukesh Singhal

    Intrusion Detection in Wireless Sensor Networks
    Fereshteh Amini, Vojislav B. Mišic, and Jelena Mišic

    False Data Detection and Secure Data Aggregation in Wireless Sensor Networks
    Hasan Çam and Suat Ozdemir

    Privacy and Anonymity in Mobile Ad Hoc Networks
    Xiaoyan Hong and Jiejun Kong

    Security Issues in the IEEE 802.15.1 Bluetooth Wireless Personal Area Networks
    Yang Xiao, Daniel Kay, Yan Zhang, Tianji Li, and Ji Jun

    State-of-the-Art Security in Grid Computing
    Giorgos Kostopoulos, Nicolas Sklavos, and Odysseas Koufopavlou

    Unifying Grid and Organizational Security Mechanisms
    David W. Chadwick

    Grid Security Architecture: Requirements, Fundamentals, Standards and Models
    Jose L. Vivas, Javier Lopez, and Jose A. Montenegro

    A Trust-Based Access Control Management Framework for a Secure Grid Environment
    James B.D. Joshi, Siqing Du, and Saubhagya R. Joshi

    Distributed Computing Grids-Safety and Security
    Mark Stephens, V.S. Sukumaran Nair, and Jacob A. Abraham

    Security Solutions for Pervasive Healthcare
    Krishna Venkatasubramanian and Sandeep K.S. Gupta

    Wireless Sensor Network Security: A Survey
    John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary


    Yang Xiao