Reflecting recent advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and often-used terms to set the foundation for the following chapters. Examining critical security issues in a range of wireless networks, the book proposes specific solutions to security threats.
Ideal for those with a basic understanding of network security, the text provides a clear examination of the key aspects of security in self-organizing networks and other networks that use wireless technology for communications. The book is organized into four sections for ease of reference:
Highlighting potential threats to network security, most chapters are written in a tutorial manner. However, some of the chapters include mathematical equations and detailed analysis for advanced readers. Guiding you through the latest trends, issues, and advances in network security, the text includes questions and sample answers in each chapter to reinforce understanding.
GENERAL TOPICS—SECURITY OF WIRELESS AND SELF-ORGANIZING NETWORKS
Secure Device Association: Trends and Issues; Yasir Arfat Malkani, Dan Chalmers, and Ianwakeman
Securing Route and Path Integrity in Multihop Wireless Networks; Stephen Glass, Marius Portmann, and Vallipuram Muthukkumarasamy
Handling Security Threats to the RFID System of EPC Networks; Joaquin Garcia-Alfaro, Michel Barbeau, and Evangelos Kranakis
Survey of Anomaly Detection Algorithms: Toward Self-Learning Networks; Tarem Ahmed and Rumana Rahman
Reputation- and Trust-Based Systems forWireless Self-Organizing Networks; Jaydip Sen
MOBILE AD-HOC NETWORK AND VEHICULAR AD-HOC NETWORK SECURITY
Security Threats in Mobile Ad Hoc Networks; Sevil Şen, John A. Clark, and Juan E. Tapiador
Key Management in Mobile Ad Hoc Networks; Sudip Misra and Sumit Goswami
Combating Against Security Attacks Against Mobile Ad Hoc Networks (MANETs); Zubair MD. Fadlullah, Tarik Taleb, and Marcus Schöller
Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Network: A Survey; Vikrant Gokhale, S.K. Ghosh, and Arobinda Gupta
Security in Vehicular Ad Hoc Networks; Vikas Singh Yadav, Sudip Misra, and Mozaffar Afaque
Toward a Robust Trust Model for Ensuring Security and Privacy in VANETs; Une Thoing Rosi and Syed Ishtiaque Ahmed
Sybil Attack in VANETs: Detection and Prevention; Jyoti Grover, M.S. Gaur, and V. Laxmi
WIRELESS SENSOR NETOWRK SECURITY
Key Management Schemes of Wireless Sensor Networks: A Survey; Syed Muhammad Khaliq-Ur-Rahman Raazi, Zeeshan Pervez, and Sungyoung Lee
Key Management Techniques for Wireless Sensor Networks: Practical and Theoretical Considerations; Effie Makri and Yannis C. Stamatiou
Bio-Inspired Intrusion Detection for Wireless Sensor Networks; Swapna Ghanekar, Nancy Alrajei, and Fatma Mili
Biological Inspired Autonomously Secure Mechanism for Wireless Sensor Networks; Kashif Saleem, Norsheila Fisal, Sharifah Hafizah Syed Ariffin, Sharifah Kamilah Syed Yusof, and Rozeha A. Rashid
Network Invading Attack on Key Pre-Distribution Schemes for Distributed Sensor Networks and Countermeasures; Thanh Dai Tran and Johnson I. Agbinya
Proactive Key Variation Owing to Dynamic Clustering (PERIODIC) in Sensor Networks; Gicheolwang and Gihwan Cho
Secure Routing Architectures Using Cross-Layer Information for Attack Avoidance (With Case Study on Wormhole Attack); James Harbin, Paul Mitchell, and David Pearce
Reputation-Based Trust Systems inWireless Sensor Networks; Hani Alzaid
MajorWorks on the Necessity and Implementations of PKC in WSNs: A Beginner’s Note; Al-Sakib Khan Pathan
WIRELESS MESH NETWORK SECURITY
Secure Access Control and Authentication in Wireless Mesh Networks; Bing He, Bin Xie, David Zhao, and Ranga Reddy
Misbehavior Detection in Wireless Mesh Networks; MD. Abdul Hamid and MD. Shariful Islam
Al-Sakib Khan Pathan is an assistant professor in the computer science and engineering department at BRAC University, Bangladesh. He worked as a researcher at Networking Lab, Department of Computer Engineering in Kyung Hee University, South Korea, where he received his PhD in 2009. He received his BSc degree in computer science and information technology from Islamic University of Technology (IUT), Bangladesh, in 2003. He has served as a Chair, Organizing Committee Member, and Technical Program Committee member in some international conferences/workshops such as HPCS 2010, ICA3PP 2010, WiMob’09 and 08, HPCC’09, and IDCS’09 and 08.
He is currently serving as an Area Editor of IJCNIS, Associate Editor of IASTED/ACTA Press IJCA, Guest Editor of several international journals, including Elsevier’s Mathematical and Computer Modelling, and editor of a book. He also serves as a referee of a few renowned journals such as IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), IEEE Transactions on Vehicular Technology (IEEE TVT), IEEE Communications Letters, Elsevier’s Computer Communications, Computer Standards and Interfaces, Computers & Electrical Engineering Journal, Journal of High Speed Networks (JHSN, IOS Press), EURASIP Journal onWireless Communications and Networking (EURASIP JWCN), International Journal of Communication Systems (IJCS,Wiley), and so on. He is a member of IEEE and several other international organizations. His research interest includes wireless sensor networks, network security, and e-services technologies.
This collection of twenty-three articles on security for ad-hoc and self-organizing wireless mobile networks presents current scholarship on a variety of topics related to this emerging networking technology. Divided into four sections the work includes discussions on general topics in wireless security such as RFID systems and multi-hop routing integrity, topics specific to mobile networks such as key management in ad-hoc networking and common attacks on vehicular networks, discussions of sensor network issues such as proactive key variation and trust webs and a brief foray into wireless mesh network security. Each chapter is a stand paper with its own table of contents, notes and bibliography. Contributors include academics in computer science and informatics from around the world.
—In Research Book News, booknews.com, February 2011