Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, 1st Edition (Hardback) book cover

Security of Self-Organizing Networks

MANET, WSN, WMN, VANET, 1st Edition

Edited by Al-Sakib Khan Pathan

Auerbach Publications

638 pages | 155 B/W Illus.

Purchasing Options:$ = USD
Hardback: 9781439819197
pub: 2010-10-14
eBook (VitalSource) : 9780429094392
pub: 2016-04-19
from $28.98

FREE Standard Shipping!


Reflecting recent advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and often-used terms to set the foundation for the following chapters. Examining critical security issues in a range of wireless networks, the book proposes specific solutions to security threats.

Ideal for those with a basic understanding of network security, the text provides a clear examination of the key aspects of security in self-organizing networks and other networks that use wireless technology for communications. The book is organized into four sections for ease of reference:

  1. General Topics—Security of Wireless and Self-Organizing Networks
  2. Mobile Ad-Hoc Network and Vehicular Ad-Hoc Network Security
  3. Wireless Sensor Network Security
  4. Wireless Mesh Network Security

Highlighting potential threats to network security, most chapters are written in a tutorial manner. However, some of the chapters include mathematical equations and detailed analysis for advanced readers. Guiding you through the latest trends, issues, and advances in network security, the text includes questions and sample answers in each chapter to reinforce understanding.


This collection of twenty-three articles on security for ad-hoc and self-organizing wireless mobile networks presents current scholarship on a variety of topics related to this emerging networking technology. Divided into four sections the work includes discussions on general topics in wireless security such as RFID systems and multi-hop routing integrity, topics specific to mobile networks such as key management in ad-hoc networking and common attacks on vehicular networks, discussions of sensor network issues such as proactive key variation and trust webs and a brief foray into wireless mesh network security. Each chapter is a stand paper with its own table of contents, notes and bibliography. Contributors include academics in computer science and informatics from around the world.

—In Research Book News,, February 2011

Table of Contents


Secure Device Association: Trends and Issues; Yasir Arfat Malkani, Dan Chalmers, and Ianwakeman

Securing Route and Path Integrity in Multihop Wireless Networks; Stephen Glass, Marius Portmann, and Vallipuram Muthukkumarasamy

Handling Security Threats to the RFID System of EPC Networks; Joaquin Garcia-Alfaro, Michel Barbeau, and Evangelos Kranakis

Survey of Anomaly Detection Algorithms: Toward Self-Learning Networks; Tarem Ahmed and Rumana Rahman

Reputation- and Trust-Based Systems forWireless Self-Organizing Networks; Jaydip Sen


Security Threats in Mobile Ad Hoc Networks; Sevil Şen, John A. Clark, and Juan E. Tapiador

Key Management in Mobile Ad Hoc Networks; Sudip Misra and Sumit Goswami

Combating Against Security Attacks Against Mobile Ad Hoc Networks (MANETs); Zubair MD. Fadlullah, Tarik Taleb, and Marcus Schöller

Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Network: A Survey; Vikrant Gokhale, S.K. Ghosh, and Arobinda Gupta

Security in Vehicular Ad Hoc Networks; Vikas Singh Yadav, Sudip Misra, and Mozaffar Afaque

Toward a Robust Trust Model for Ensuring Security and Privacy in VANETs; Une Thoing Rosi and Syed Ishtiaque Ahmed

Sybil Attack in VANETs: Detection and Prevention; Jyoti Grover, M.S. Gaur, and V. Laxmi


Key Management Schemes of Wireless Sensor Networks: A Survey; Syed Muhammad Khaliq-Ur-Rahman Raazi, Zeeshan Pervez, and Sungyoung Lee

Key Management Techniques for Wireless Sensor Networks: Practical and Theoretical Considerations; Effie Makri and Yannis C. Stamatiou

Bio-Inspired Intrusion Detection for Wireless Sensor Networks; Swapna Ghanekar, Nancy Alrajei, and Fatma Mili

Biological Inspired Autonomously Secure Mechanism for Wireless Sensor Networks; Kashif Saleem, Norsheila Fisal, Sharifah Hafizah Syed Ariffin, Sharifah Kamilah Syed Yusof, and Rozeha A. Rashid

Network Invading Attack on Key Pre-Distribution Schemes for Distributed Sensor Networks and Countermeasures; Thanh Dai Tran and Johnson I. Agbinya

Proactive Key Variation Owing to Dynamic Clustering (PERIODIC) in Sensor Networks; Gicheolwang and Gihwan Cho

Secure Routing Architectures Using Cross-Layer Information for Attack Avoidance (With Case Study on Wormhole Attack); James Harbin, Paul Mitchell, and David Pearce

Reputation-Based Trust Systems inWireless Sensor Networks; Hani Alzaid

MajorWorks on the Necessity and Implementations of PKC in WSNs: A Beginner’s Note; Al-Sakib Khan Pathan


Secure Access Control and Authentication in Wireless Mesh Networks; Bing He, Bin Xie, David Zhao, and Ranga Reddy

Misbehavior Detection in Wireless Mesh Networks; MD. Abdul Hamid and MD. Shariful Islam

About the Editor

Al-Sakib Khan Pathan is an assistant professor in the computer science and engineering department at BRAC University, Bangladesh. He worked as a researcher at Networking Lab, Department of Computer Engineering in Kyung Hee University, South Korea, where he received his PhD in 2009. He received his BSc degree in computer science and information technology from Islamic University of Technology (IUT), Bangladesh, in 2003. He has served as a Chair, Organizing Committee Member, and Technical Program Committee member in some international conferences/workshops such as HPCS 2010, ICA3PP 2010, WiMob’09 and 08, HPCC’09, and IDCS’09 and 08.

He is currently serving as an Area Editor of IJCNIS, Associate Editor of IASTED/ACTA Press IJCA, Guest Editor of several international journals, including Elsevier’s Mathematical and Computer Modelling, and editor of a book. He also serves as a referee of a few renowned journals such as IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), IEEE Transactions on Vehicular Technology (IEEE TVT), IEEE Communications Letters, Elsevier’s Computer Communications, Computer Standards and Interfaces, Computers & Electrical Engineering Journal, Journal of High Speed Networks (JHSN, IOS Press), EURASIP Journal onWireless Communications and Networking (EURASIP JWCN), International Journal of Communication Systems (IJCS,Wiley), and so on. He is a member of IEEE and several other international organizations. His research interest includes wireless sensor networks, network security, and e-services technologies.

Subject Categories

BISAC Subject Codes/Headings:
COMPUTERS / Networking / General
TECHNOLOGY & ENGINEERING / Telecommunications
TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications