LEADER 04453oam 2200625I 450 001 9910785263703321 005 20230725025114.0 010 $a0-429-09439-6 010 $a1-282-90290-3 010 $a9786612902901 010 $a1-4398-1920-3 024 7 $a10.1201/EBK1439819197 035 $a(CKB)2670000000047851 035 $a(EBL)599718 035 $a(OCoLC)680038492 035 $a(SSID)ssj0000427893 035 $a(PQKBManifestationID)11284052 035 $a(PQKBTitleCode)TC0000427893 035 $a(PQKBWorkID)10414284 035 $a(PQKB)10831706 035 $a(MiAaPQ)EBC599718 035 $a(Au-PeEL)EBL599718 035 $a(CaPaEBR)ebr10424669 035 $a(CaONFJC)MIL290290 035 $a(EXLCZ)992670000000047851 100 $a20180331d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aSecurity of self-organizing networks $eMANET, WSN, WMN, VANET /$feditor, Al-Sakib Khan Pathan 210 1$aBoca Raton :$cAuerbach Publications,$d2011. 215 $a1 online resource (614 p.) 300 $aDescription based upon print version of record. 311 $a1-4665-4776-6 311 $a1-4398-1919-X 320 $aIncludes bibliographical references and index. 327 $aFront cover; Contents; Preface; Acknowledgments; Editor; Contributors; Part I: GENERAL TOPICS-SECURITY OF WIRELESS AND SELF-ORGANIZINGNETWORKS; Chapter 1: Secure Device Association; Chapter 2: Securing Route and PathIntegrity in Multihop Wireless Networks; Chapter 3: Handling Security Threatsto the RFID System of EPC Networks; Chapter 4: Survey of Anomaly Detection Algorithms; Chapter 5: Reputation- and Trust-BasedSystems forWirelessSelf-Organizing Networks; Part II: MOBILE AD HOC NETWORK ANDVEHICULAR AD HOCNETWORK SECURITY; Chapter 6: Security Threats in Mobile Ad Hoc Networks 327 $aChapter 7: Key Management in Mobile Ad Hoc NetworksChapter 8: Combating against SecurityAttacks against MobileAd Hoc Networks (MANETs); Chapter 9: Classification of AttacksonWireless Mobile Ad HocNetworks and Vehicular Ad Hoc Networks; Chapter 10: Security in Vehicular Ad Hoc Networks; Chapter 11: Toward a Robust Trust Modelfor Ensuring Security and Privacy in VANETs; Chapter 12: Sybil Attack in VANETs; Part III: WIRELESS SENSORNETWORK SECURITY; Chapter 13: Key Management SchemesofWireless Sensor Networks; Chapter 14: Key Management TechniquesforWireless Sensor Networks 327 $aChapter 15: Bio-Inspired IntrusionDetection forWireless Sensor NetworksChapter 16: Biological InspiredAutonomously SecureMechanism forWireless Sensor Networks; Chapter 17:Controlled Link Establishment Attack on KeyPre-Distribution Schemes forDistributed Sensor Networksand Countermeasures; Chapter 18: Proactive Key VariationOwing to Dynamic Clustering(PERIODIC) in Sensor Networks; Chapter 19: Secure Routing ArchitecturesUsing Cross-LayerInformation for AttackAvoidance (with Case Study on Wormhole Attacks); Chapter 20: Reputation-Based TrustSystems in Wireless Sensor Networks 327 $aChapter 21: Major Works on the Necessityand Implementations of PKC in WSNsPart IV: WIRELESS MESH NETWORK SECURITY; Chapter 22: Secure Access Control andAuthentication inWireless Mesh Networks; Chapter 23: Misbehavior Detection in Wireless Mesh Networks; Back cover 330 $aReflecting recent advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and often-used terms to set the foundation for the following chapters. Examining critical security issues in a range of wireless networks, the book proposes specific solutions to security threats. Ideal for those with a basic understanding of network security, the text provides a clear examination of the key aspects of security in self-organizing networks and othe 606 $aAd hoc networks (Computer networks)$xSecurity measures 606 $aSelf-organizing systems$xSecurity measures 615 0$aAd hoc networks (Computer networks)$xSecurity measures. 615 0$aSelf-organizing systems$xSecurity measures. 676 $a005.8 701 $aPathan$b Al-Sakib Khan$01500811 801 0$bFlBoTFG 801 1$bFlBoTFG 906 $aBOOK 912 $a9910785263703321 996 $aSecurity of self-organizing networks$93727635 997 $aUNINA