skip to main content
Skip header Section
Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous ComputingAugust 2007
Publisher:
  • Cambridge University Press
  • 40 W. 20 St. New York, NY
  • United States
ISBN:978-0-521-87371-0
Published:01 August 2007
Pages:
500
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

The current rate of deployment of wireless networks - whether cellular, LAN, Bluetooth, or sensor - is remarkable. Wireless systems are vulnerable to many kinds of attack, and the security features of fixed-line systems are not always applicable in the wireless arena. With ever-increasing amounts of data being carried on wireless networks, security has become a major concern and an area of great commercial importance. This book presents the key features of wireless networks and discusses various techniques for ensuring secure communication. In particular, techniques for dealing with hacking and other forms of attack will be dealt with, as will cooperation in multi-hop and ad hoc networks. It is suitable for senior undergraduates and graduate students of electrical engineering and computer science. Given the breadth of coverage, it will also appeal to researchers and practitioners in the wireless industry.

Cited By

  1. Caballero P, Banchs A, De Veciana G and Costa-Perez X (2019). Network Slicing Games, IEEE/ACM Transactions on Networking, 27:2, (662-675), Online publication date: 1-Apr-2019.
  2. ACM
    Guo P, Hu B, Li R and Hu W FoggyCache Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, (19-34)
  3. Banchs A, Ortin J, Garcia-Saavedra A, Leith D and Serrano P (2016). Thwarting selfish behavior in 802.11 WLANs, IEEE/ACM Transactions on Networking, 24:1, (492-505), Online publication date: 1-Feb-2016.
  4. Arthur M and Kannan K (2016). Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks, Wireless Networks, 22:3, (1035-1059), Online publication date: 1-Apr-2016.
  5. ACM
    Santhi G An Efficient Intrusion Detection System based on Adaptive Acknowledgement with Digital Signature scheme in MANETs Proceedings of the International Conference on Informatics and Analytics, (1-5)
  6. ACM
    Illiano V and Lupu E (2015). Detecting Malicious Data Injections in Wireless Sensor Networks, ACM Computing Surveys, 48:2, (1-33), Online publication date: 21-Nov-2015.
  7. (2014). Survey on VANET security challenges and possible cryptographic solutions, Vehicular Communications, 1:2, (53-66), Online publication date: 1-Apr-2014.
  8. ACM
    Manshaei M, Zhu Q, Alpcan T, Bacşar T and Hubaux J (2013). Game theory meets network security and privacy, ACM Computing Surveys, 45:3, (1-39), Online publication date: 1-Jun-2013.
  9. Selimis G, Huang L, Massé F, Tsekoura I, Ashouei M, Catthoor F, Huisken J, Stuyt J, Dolmans G, Penders J and Groot H (2011). A Lightweight Security Scheme for Wireless Body Area Networks, Journal of Medical Systems, 35:5, (1289-1298), Online publication date: 1-Oct-2011.
  10. Santos F, Humbert M, Shokri R and Hubaux J Collaborative location privacy with rational users Proceedings of the Second international conference on Decision and Game Theory for Security, (163-181)
  11. Bilogrevic I, Manshaei M, Raya M and Hubaux J (2011). OREN, Computer Networks: The International Journal of Computer and Telecommunications Networking, 55:5, (1168-1180), Online publication date: 1-Apr-2011.
  12. ACM
    Das T, Mohan P, Padmanabhan V, Ramjee R and Sharma A PRISM Proceedings of the 8th international conference on Mobile systems, applications, and services, (63-76)
  13. ACM
    Kang N, Shakshuki E and Sheltami T Detecting misbehaving nodes in MANETs Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services, (216-222)
  14. Galuba W, Papadimitratos P, Poturalski M, Aberer K, Despotovic Z and Kellerer W Castor Proceedings of the 29th conference on Information communications, (2829-2837)
  15. Zhang C, Zhu X, Song Y and Fang Y A formal study of trust-based routing in wireless ad hoc networks Proceedings of the 29th conference on Information communications, (2838-2846)
  16. Humbert M, Manshaei M, Freudiger J and Hubaux J Tracking games in mobile networks Proceedings of the First international conference on Decision and game theory for security, (38-57)
  17. Zhang N, Yu W, Fu X and Das S gPath Proceedings of the First international conference on Decision and game theory for security, (58-71)
  18. Zahary A and Ayesh A (2010). An analytical review for multipath routing in Mobile Ad Hoc Networks, International Journal of Ad Hoc and Ubiquitous Computing, 5:2, (69-85), Online publication date: 1-Jan-2010.
  19. ACM
    Zhang X and Li C The security in cognitive radio networks Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, (309-313)
  20. ACM
    Freudiger J, Manshaei M, Hubaux J and Parkes D On non-cooperative location privacy Proceedings of the 16th ACM conference on Computer and communications security, (324-337)
  21. Yang S, Zhong F, Yeo C, Lee B and Boleng J Position based opportunistic routing for robust data delivery in MANETs Proceedings of the 28th IEEE conference on Global telecommunications, (1325-1330)
  22. Mari F, Melatti I, Salvo I, Tronci E, Alvisi L, Clement A and Li H Model Checking Coalition Nash Equilibria in MAD Distributed Systems Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, (531-546)
  23. Manulis M Securing Remote Access Inside Wireless Mesh Networks Information Security Applications, (324-338)
  24. Caballero-Gil P, Molina-Gil J, Hernandez-Goya C and Caballero-Gil C Stimulating cooperation in self-organized vehicular networks Proceedings of the 15th Asia-Pacific conference on Communications, (322-325)
  25. ACM
    Wu F, Chen T, Zhong S, Li L and Yang Y Incentive-compatible opportunistic routing for wireless networks Proceedings of the 14th ACM international conference on Mobile computing and networking, (303-314)
  26. ACM
    Mohan P, Padmanabhan V and Ramjee R Nericell Proceedings of the 6th ACM conference on Embedded network sensor systems, (323-336)
  27. Mari F, Melatti I, Salvo I, Tronci E, Alvisi L, Clement A and Li H Model checking nash equilibria in MAD distributed systems Proceedings of the 2008 International Conference on Formal Methods in Computer-Aided Design, (1-8)
  28. Katz J Bridging game theory and cryptography Proceedings of the 5th conference on Theory of cryptography, (251-272)
  29. ACM
    Raya M, Manshaei M, Félegyhazi M and Hubaux J Revocation games in ephemeral networks Proceedings of the 15th ACM conference on Computer and communications security, (199-210)
  30. Felegyhazi M, Cagalj M, Dufour D and Hubaux J Border Games in Cellular Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (812-820)
  31. Badonnel R and Burgess M Fault detection in autonomic networks using the concept of promised cooperation Proceedings of the Distributed systems: operations and management 18th IFIP/IEEE international conference on Managing virtualization of networks and services, (62-73)
Contributors
  • Budapest University of Technology and Economics

Recommendations