Security in Wireless Mesh Networks

Security in Wireless Mesh Networks

Series:
Published:
Content:
Editor(s):
Free Standard Shipping

Purchasing Options

Hardback
$115.95
ISBN 9780849382505
Cat# AU8250
Add to cart
eBook (VitalSource)
$115.95 $81.17
ISBN 9780849382543
Cat# AUE8250
Add to cart
SAVE 30%
eBook Rentals
 

Features

  • Provides a comprehensive reference on security in WMN
  • Covers basic concepts, protocols, and architectures
  • Details attacks, secure routing, secure cross-layer protocols, encryption, confidentiality, and more
  • Explores emerging standardization activities, security specifications, and security enhancements
  • Identifies future directions on security in WMN
  • Summary

    Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. To achieve these aims, security mechanisms are essential to ensure trusted on-going communications.

    Security in Wireless Mesh Networks explores key security challenges set in diverse scenarios, as well as emerging standards that include authentication, access control and authorization, attacks, privacy and trust, encryption, key management, identity management, DoS attacks, intrusion detection and prevention, secure routing, and security policies. The book also examines security mechanisms in IEEE 802.11, IEEE 802.15, IEEE 802.16, and IEEE 802.20 standards.  In addition, it provides numerous case studies and applications to facilitate understanding.

    As a single, comprehensive guide to security-related issues in WMN, this book is an important resource to have if you are working on the design, selection, and implementation of wireless mesh networks and system components.

    Table of Contents

    PART I: INTRODUCTION

    An Introduction to Wireless Mesh Networks A. Antony Franklin and C. Siva Ram Murthy

    Mesh Networking in Wireless PANs, LANs, MANs,

    and WANs N. Krichene and N. Boudriga

    PART II: SECURITY PROTOCOLS AND TECHNIQUES

    Attacks and Security Mechanisms A. Naveed, S. S. Kanhere, and S. K. Jha

    Intrusion Detection in Wireless Mesh Networks T. M. Chen, G.-S. Kuo, Z.-P. Li,

    and G.-M. Zhu

    Secure Routing in Wireless Mesh Networks M. G. Zapata

    Hop Integrity in Wireless Mesh Networks C.-T. Huang

    Privacy Preservation in Wireless Mesh Networks T. Wu, Y. Xue, and Y. Cui

    Providing Authentication, Trust, and Privacy in

    Wireless Mesh Networks H. Moustafa

    Non-Interactive Key Establishment in Wireless

    Mesh Networks Z. Li and J.J. Garcia-Luna-Aceves

    Key Management in Wireless Mesh Networks M. G. Zapata

    PART III: SECURITY STANDARDS, APPLICATIONS, AND ENABLING TECHNOLOGIES

    Security in Wireless PAN Mesh Networks S. Seys, D. Singelee, and B. Preneel

    Security in Wireless LAN Mesh Networks N. Cam-Winget and S. Rahman

    Security in IEEE 802.15.4 Cluster-Based Networks M. Khan and J. Misic

    Security in Wireless Sensor Networks Y. Wang, G. Attebury, and B. Ramamurthy

    Key Management in Wireless Sensor Networks F. Dressler

    INDEX

     
    Textbooks
    Other CRC Press Sites
    Featured Authors
    STAY CONNECTED
    Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press Pinterest Page for CRC Press
    Sign Up for Email Alerts
    © 2014 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us