Security of Self-Organizing Networks: MANET, WSN, WMN, VANET

Free Standard Shipping

Purchasing Options

ISBN 9781439819197
Cat# K11012



SAVE 20%

eBook (VitalSource)
ISBN 9781439819203
Cat# KE10902



SAVE 30%

eBook Rentals

Other eBook Options:


  • Covers wireless ad hoc networks, wireless sensor networks, wireless mesh networks, vehicular networks, and other networks that use wireless technology for communications
  • Provides essential information about wireless network security
  • Reports on recent advancements in the security of various types of wireless networks


Reflecting recent advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and often-used terms to set the foundation for the following chapters. Examining critical security issues in a range of wireless networks, the book proposes specific solutions to security threats.

Ideal for those with a basic understanding of network security, the text provides a clear examination of the key aspects of security in self-organizing networks and other networks that use wireless technology for communications. The book is organized into four sections for ease of reference:

  1. General Topics—Security of Wireless and Self-Organizing Networks
  2. Mobile Ad-Hoc Network and Vehicular Ad-Hoc Network Security
  3. Wireless Sensor Network Security
  4. Wireless Mesh Network Security

Highlighting potential threats to network security, most chapters are written in a tutorial manner. However, some of the chapters include mathematical equations and detailed analysis for advanced readers. Guiding you through the latest trends, issues, and advances in network security, the text includes questions and sample answers in each chapter to reinforce understanding.

Table of Contents


Secure Device Association: Trends and Issues; Yasir Arfat Malkani, Dan Chalmers, and Ianwakeman
Securing Route and Path Integrity in Multihop Wireless Networks; Stephen Glass, Marius Portmann, and Vallipuram Muthukkumarasamy
Handling Security Threats to the RFID System of EPC Networks; Joaquin Garcia-Alfaro, Michel Barbeau, and Evangelos Kranakis
Survey of Anomaly Detection Algorithms: Toward Self-Learning Networks; Tarem Ahmed and Rumana Rahman
Reputation- and Trust-Based Systems forWireless Self-Organizing Networks; Jaydip Sen

Security Threats in Mobile Ad Hoc Networks; Sevil Şen, John A. Clark, and Juan E. Tapiador
Key Management in Mobile Ad Hoc Networks; Sudip Misra and Sumit Goswami
Combating Against Security Attacks Against Mobile Ad Hoc Networks (MANETs); Zubair MD. Fadlullah, Tarik Taleb, and Marcus Schöller
Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Network: A Survey; Vikrant Gokhale, S.K. Ghosh, and Arobinda Gupta
Security in Vehicular Ad Hoc Networks; Vikas Singh Yadav, Sudip Misra, and Mozaffar Afaque
Toward a Robust Trust Model for Ensuring Security and Privacy in VANETs; Une Thoing Rosi and Syed Ishtiaque Ahmed
Sybil Attack in VANETs: Detection and Prevention; Jyoti Grover, M.S. Gaur, and V. Laxmi

Key Management Schemes of Wireless Sensor Networks: A Survey; Syed Muhammad Khaliq-Ur-Rahman Raazi, Zeeshan Pervez, and Sungyoung Lee
Key Management Techniques for Wireless Sensor Networks: Practical and Theoretical Considerations; Effie Makri and Yannis C. Stamatiou
Bio-Inspired Intrusion Detection for Wireless Sensor Networks; Swapna Ghanekar, Nancy Alrajei, and Fatma Mili
Biological Inspired Autonomously Secure Mechanism for Wireless Sensor Networks; Kashif Saleem, Norsheila Fisal, Sharifah Hafizah Syed Ariffin, Sharifah Kamilah Syed Yusof, and Rozeha A. Rashid
Network Invading Attack on Key Pre-Distribution Schemes for Distributed Sensor Networks and Countermeasures; Thanh Dai Tran and Johnson I. Agbinya
Proactive Key Variation Owing to Dynamic Clustering (PERIODIC) in Sensor Networks; Gicheolwang and Gihwan Cho
Secure Routing Architectures Using Cross-Layer Information for Attack Avoidance (With Case Study on Wormhole Attack); James Harbin, Paul Mitchell, and David Pearce
Reputation-Based Trust Systems inWireless Sensor Networks; Hani Alzaid
MajorWorks on the Necessity and Implementations of PKC in WSNs: A Beginner’s Note; Al-Sakib Khan Pathan

Secure Access Control and Authentication in Wireless Mesh Networks; Bing He, Bin Xie, David Zhao, and Ranga Reddy
Misbehavior Detection in Wireless Mesh Networks; MD. Abdul Hamid and MD. Shariful Islam

Author Bio(s)

Editorial Reviews

This collection of twenty-three articles on security for ad-hoc and self-organizing wireless mobile networks presents current scholarship on a variety of topics related to this emerging networking technology. Divided into four sections the work includes discussions on general topics in wireless security such as RFID systems and multi-hop routing integrity, topics specific to mobile networks such as key management in ad-hoc networking and common attacks on vehicular networks, discussions of sensor network issues such as proactive key variation and trust webs and a brief foray into wireless mesh network security. Each chapter is a stand paper with its own table of contents, notes and bibliography. Contributors include academics in computer science and informatics from around the world.
—In Research Book News,, February 2011