Item type | Current library | Call number | Status | Barcode | |
---|---|---|---|---|---|
![]() |
Anna Centenary Library 3RD FLOOR, A WING | 005.8 BUT (Browse shelf(Opens below)) | Not for loan | 95726 |
Includes bibliographies and index
As wireless networking becomes almost ubiquitous, it is important to anticipate potential malicious and selfish misdeeds. This self-contained text is the first to provide a scholarly description of security and non-cooperative behavior in wireless networks." "The major networking trends are analyzed and their implications explained in terms of security and cooperation. Key problems such as cheating with identities, illegitimate access to confidential data, attacks against privacy and "stealing of bandwidth" are described along with the existing security techniques and putative methods of protection for the future. The fundamental questions of security: user and device identification; establishment of security associations; secure and cooperative routing in multi-hop network; fair bandwidth distribution; privacy protection, and so on, are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor and RFID networks. The important relationships between trust, security, and cooperation are also discussed." "End of chapter homework problems test the reader and open new directions of thought; and two tutorials in the appendices, on cryptographic protocols and game theory, provide a review of the background material required to grasp the core concepts." "Ideal for senior undergraduates and graduate students of electrical engineering and computer science, this book will also be an invaluable resource on thwarting malicious and selfish behavior for researchers and practitioners in the wireless industry.
There are no comments on this title.