Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing by Levente ButtyánSecurity and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing by Levente Buttyán

Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age…

byLevente Buttyán, Jean-Pierre Hubaux

Hardcover | November 29, 2007

Pricing and Purchase Info

$117.25

Earn 586 plum® points
Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

The current rate of deployment of wireless networks - whether cellular, LAN, Bluetooth, or sensor - is remarkable. Wireless systems are vulnerable to many kinds of attack, and the security features of fixed-line systems are not always applicable in the wireless arena. With ever-increasing amounts of data being carried on wireless networks, security has become a major concern and an area of great commercial importance. This book presents the key features of wireless networks and discusses various techniques for ensuring secure communication. In particular, techniques for dealing with hacking and other forms of attack will be dealt with, as will cooperation in multi-hop and ad hoc networks. It is suitable for senior undergraduates and graduate students of electrical engineering and computer science. Given the breadth of coverage, it will also appeal to researchers and practitioners in the wireless industry.
Title:Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age…Format:HardcoverDimensions:496 pages, 9.72 × 6.85 × 1.1 inPublished:November 29, 2007Publisher:Cambridge University PressLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:0521873711

ISBN - 13:9780521873710

Reviews

Table of Contents

Part I. Introduction: 1. The security of existing wireless networks; 2. Upcoming wireless networks and new challenges; 3. Trust assumptions and adversary models; Part II. Thwarting Malicious Behavior: 4. Naming and addressing; 5. Establishment of security associations; 6. Securing neighbor discovery; 7. Secure routing in multi-hop wireless networks; 8. Privacy protection; Part III. Thwarting Selfish Behavior: 9. Selfish behavior at the MAC layer of CSMA/CA; 10. Selfishness in packet forwarding; 11. Wireless operators in a shared spectrum; 12. Secure protocols for behavior enforcement; Appendices: A. Introduction to cryptographic algorithms and protocols; B. A tutorial on game theory for wireless networks; Bibliography; Index.

Editorial Reviews

"Security and Cooperation in Wireless Networks achieves its goal of explaining how to prevent malicious and selfish behavior. It is a well written book that can serve as an inspiration for future research. Therefore, we can wholeheartedly recommend this book most of all for postgraduate students and lecturers, but also for researchers working in the field of wireless security.
IEEE Communications Magazine, March 2009