Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Mobile and Wireless Network Security and Privacy -

Mobile and Wireless Network Security and Privacy (eBook)

eBook Download: PDF
2007 | 2007
XIV, 224 Seiten
Springer US (Verlag)
978-0-387-71058-7 (ISBN)
Systemvoraussetzungen
149,79 inkl. MwSt
(CHF 146,30)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book brings together a number of papers that represent seminal contributions underlying mobile and wireless network security and privacy. It provides a foundation for implementation and standardization as well as further research. The diverse topics and protocols described in this book give the reader a good idea of the current state-of-the-art technologies in mobile and wireless network security and privacy.


Mobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless networks and mobile computing. The material includes a report to the National Science Foundation of the United States which will be used by program managers for the foundation in setting priorities for research directions in this area. In the following chapters field experts expand upon the report and provide further information about important research directions in the fields of wireless networks and mobile computing. The chapters are written by the leading international researchers and professionals in thes fields. Each chapter represents state-of-the-art research and includes several influential contributions. A multitude of valuable discussions on relevant concepts, such as the various approaches that define emerging security and privacy in mobile and wireless environment, are featured.The book is useful to researchers working in the fields of mobile and wireless security and privacy and to graduate students seeking new areas to perform research.  It also provides information for academics and industry people researching recent trends and developments in the mobile and wireless security fields.

Contents 5
Preface 11
1 Research Directions in Security and Privacy for Mobile and Wireless Networks 14
1.1 Introduction 14
1.2 The State of the Art 17
1.3 Areas for Future Research 19
1.4 General Recommendations for Research 31
1.5 Conclusion 35
2 Pervasive Systems: Enhancing Trust Negotiation with Privacy Support 36
2.1 Introduction 36
2.2 Trust Negotiation 38
2.3 Weaknesses of Trust Negotiation 39
2.4 Extending Trust Negotiation to Support Privacy 44
2.5 Proposed Trust Protocol Extended to Support Privacy 46
2.6 Privacy Agreement 48
2.7 Conclusions 49
References 50
3 Applying Trust in Mobile and Wireless Networks 52
3.1 Introduction 52
3.2 Attack Analysis for MANETs 53
3.3 Existing Trust Models 58
3.4 Recent Trust Models 71
3.5 Conclusions 76
References 78
4 A Framework for Computing Trust in Mobile Ad- Hoc Networks 80
4.1 Introduction 80
4.2 Related Work 81
4.3 Proposed Model 82
4.4 Simulation 88
4.5 Conclusion 93
References 94
5 The Concept of Opportunistic Networks and their Research Challenges in Privacy and Security 97
5.1 Introduction 97
5.2 Opportunistic Networks: Basics of Operation 101
5.3 Example Oppnet Applications and Use Scenarios 105
5.4 Related Work in Privacy and Security 108
5.5 The Critical Significance of Privacy Challenges in Oppnets 114
5.6 Privacy and Security Challenges in Oppnets 116
5.7 Conclusions 123
Acknowledgements 124
References 125
6 On Performance Cost of On-demand Anonymous Routing Protocols in Mobile Ad Hoc Networks 130
6.1 Introduction 130
6.2 Anonymous Routing Revisited 134
6.3 Performance Evaluation 141
6.4 Related Work 149
6.5 Conclusion 150
References 151
7 Computer Ecology: Responding to Mobile Worms with Location- Based Quarantine Boundaries 154
7.1 Introduction 154
7.2 Threa ssessment t A 155
7.3 Quarantine Boundary Estimation 160
7.4 Evaluation 164
7.5 Discussion 170
7.6 Related Work 173
7.7 Conclusions 174
Acknowledgment 174
References 175
8 Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions 178
8.1 Introduction 178
8.2 Challenges of Unplanned Interactions 181
8.3 Approaches 185
8.4 Conclusion 196
References 197
9 An Anonymous MAC Protocol for Wireless Ad- hoc Networks 201
9.1 Introduction 201
9.2 Protocol Design 203
9.3 Security Analysis 207
9.4 Performance Evaluation 210
9.5 Conclusions 213
Acknowledgements 213
References 213
10 Hardware/Software Solution to Improve Security in Mobile Ad- hoc Networks 215
10.1 Introduction 215
10.2 Background and Related work 10.2.1 Detection, identification, and isolation of malicious nodes 217
10.2.2 Secure and QoS-aware routing 218
10.3 Comprehensive Software/Hardware Schemes for Security in Ad- hoc Networks 219
10.3.1 Detecting misbehavior, identifying and isolating malicious nodes 219
10.3.2 Secure, QoS-aware routing 225
10.4 Implications and Future Research 226
References 227
Index 228

Erscheint lt. Verlag 9.8.2007
Zusatzinfo XIV, 224 p.
Verlagsort New York
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Computer • Ecology • Hardware • Information • Material • mobile computing • Network • Networks • Network Security • Performance • privacy • Routing • Software • Standard • Technology
ISBN-10 0-387-71058-2 / 0387710582
ISBN-13 978-0-387-71058-7 / 9780387710587
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
PDFPDF (Wasserzeichen)
Größe: 7,2 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
CHF 48,75
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
CHF 78,15