The current rate of deployment of wireless networks - whether cellular, LAN, Bluetooth, or sensor - is remarkable. Wireless systems are vulnerable to many kinds of attack, and the security features of fixed-line systems are not always applicable in the wireless arena. With ever-increasing amounts of data being carried on wireless networks, security has become a major concern and an area of great commercial importance. This book presents the key features of wireless networks and discusses various techniques for ensuring secure communication. In particular, techniques for dealing with hacking and other forms of attack will be dealt with, as will cooperation in multi-hop and ad hoc networks. It is suitable for senior undergraduates and graduate students of electrical engineering and computer science. Given the breadth of coverage, it will also appeal to researchers and practitioners in the wireless industry.
Cited By
- Caballero P, Banchs A, De Veciana G and Costa-Perez X (2019). Network Slicing Games, IEEE/ACM Transactions on Networking, 27:2, (662-675), Online publication date: 1-Apr-2019.
- Guo P, Hu B, Li R and Hu W FoggyCache Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, (19-34)
- Banchs A, Ortin J, Garcia-Saavedra A, Leith D and Serrano P (2016). Thwarting selfish behavior in 802.11 WLANs, IEEE/ACM Transactions on Networking, 24:1, (492-505), Online publication date: 1-Feb-2016.
- Arthur M and Kannan K (2016). Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks, Wireless Networks, 22:3, (1035-1059), Online publication date: 1-Apr-2016.
- Santhi G An Efficient Intrusion Detection System based on Adaptive Acknowledgement with Digital Signature scheme in MANETs Proceedings of the International Conference on Informatics and Analytics, (1-5)
- Illiano V and Lupu E (2015). Detecting Malicious Data Injections in Wireless Sensor Networks, ACM Computing Surveys, 48:2, (1-33), Online publication date: 21-Nov-2015.
- (2014). Survey on VANET security challenges and possible cryptographic solutions, Vehicular Communications, 1:2, (53-66), Online publication date: 1-Apr-2014.
- Manshaei M, Zhu Q, Alpcan T, Bacşar T and Hubaux J (2013). Game theory meets network security and privacy, ACM Computing Surveys, 45:3, (1-39), Online publication date: 1-Jun-2013.
- Selimis G, Huang L, Massé F, Tsekoura I, Ashouei M, Catthoor F, Huisken J, Stuyt J, Dolmans G, Penders J and Groot H (2011). A Lightweight Security Scheme for Wireless Body Area Networks, Journal of Medical Systems, 35:5, (1289-1298), Online publication date: 1-Oct-2011.
- Santos F, Humbert M, Shokri R and Hubaux J Collaborative location privacy with rational users Proceedings of the Second international conference on Decision and Game Theory for Security, (163-181)
- Bilogrevic I, Manshaei M, Raya M and Hubaux J (2011). OREN, Computer Networks: The International Journal of Computer and Telecommunications Networking, 55:5, (1168-1180), Online publication date: 1-Apr-2011.
- Das T, Mohan P, Padmanabhan V, Ramjee R and Sharma A PRISM Proceedings of the 8th international conference on Mobile systems, applications, and services, (63-76)
- Kang N, Shakshuki E and Sheltami T Detecting misbehaving nodes in MANETs Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services, (216-222)
- Galuba W, Papadimitratos P, Poturalski M, Aberer K, Despotovic Z and Kellerer W Castor Proceedings of the 29th conference on Information communications, (2829-2837)
- Zhang C, Zhu X, Song Y and Fang Y A formal study of trust-based routing in wireless ad hoc networks Proceedings of the 29th conference on Information communications, (2838-2846)
- Humbert M, Manshaei M, Freudiger J and Hubaux J Tracking games in mobile networks Proceedings of the First international conference on Decision and game theory for security, (38-57)
- Zhang N, Yu W, Fu X and Das S gPath Proceedings of the First international conference on Decision and game theory for security, (58-71)
- Zahary A and Ayesh A (2010). An analytical review for multipath routing in Mobile Ad Hoc Networks, International Journal of Ad Hoc and Ubiquitous Computing, 5:2, (69-85), Online publication date: 1-Jan-2010.
- Zhang X and Li C The security in cognitive radio networks Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, (309-313)
- Freudiger J, Manshaei M, Hubaux J and Parkes D On non-cooperative location privacy Proceedings of the 16th ACM conference on Computer and communications security, (324-337)
- Yang S, Zhong F, Yeo C, Lee B and Boleng J Position based opportunistic routing for robust data delivery in MANETs Proceedings of the 28th IEEE conference on Global telecommunications, (1325-1330)
- Mari F, Melatti I, Salvo I, Tronci E, Alvisi L, Clement A and Li H Model Checking Coalition Nash Equilibria in MAD Distributed Systems Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, (531-546)
- Manulis M Securing Remote Access Inside Wireless Mesh Networks Information Security Applications, (324-338)
- Caballero-Gil P, Molina-Gil J, Hernandez-Goya C and Caballero-Gil C Stimulating cooperation in self-organized vehicular networks Proceedings of the 15th Asia-Pacific conference on Communications, (322-325)
- Wu F, Chen T, Zhong S, Li L and Yang Y Incentive-compatible opportunistic routing for wireless networks Proceedings of the 14th ACM international conference on Mobile computing and networking, (303-314)
- Mohan P, Padmanabhan V and Ramjee R Nericell Proceedings of the 6th ACM conference on Embedded network sensor systems, (323-336)
- Mari F, Melatti I, Salvo I, Tronci E, Alvisi L, Clement A and Li H Model checking nash equilibria in MAD distributed systems Proceedings of the 2008 International Conference on Formal Methods in Computer-Aided Design, (1-8)
- Katz J Bridging game theory and cryptography Proceedings of the 5th conference on Theory of cryptography, (251-272)
- Raya M, Manshaei M, Félegyhazi M and Hubaux J Revocation games in ephemeral networks Proceedings of the 15th ACM conference on Computer and communications security, (199-210)
- Felegyhazi M, Cagalj M, Dufour D and Hubaux J Border Games in Cellular Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (812-820)
- Badonnel R and Burgess M Fault detection in autonomic networks using the concept of promised cooperation Proceedings of the Distributed systems: operations and management 18th IFIP/IEEE international conference on Managing virtualization of networks and services, (62-73)
Recommendations
Routing security in wireless ad hoc networks
A mobile ad hoc network consists of a collection of wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure or any centralized administration. MANET is an emerging research area with practical ...
A Proposed Security Subsystem for Ad Hoc Wireless Networks
IFCSTA '09: Proceedings of the 2009 International Forum on Computer Science-Technology and Applications - Volume 02Ad Hoc Networks are a new generation of networks offering unrestricted mobility without any underlying infrastructure. Due to lack of centralized control, secured communication in mobile ad hoc network is a crucial issue due to dynamic nature of the ...