LEADER 06503nam 2200625 450 001 9910830453203321 005 20240219160029.0 010 $a1-280-82233-3 010 $a9786610822331 010 $a0-470-11847-4 010 $a0-470-11846-6 024 7 $a10.1002/0470118474 035 $a(CKB)1000000000327274 035 $a(EBL)287302 035 $a(SSID)ssj0000243243 035 $a(PQKBManifestationID)11237149 035 $a(PQKBTitleCode)TC0000243243 035 $a(PQKBWorkID)10322109 035 $a(PQKB)10641409 035 $a(MiAaPQ)EBC287302 035 $a(CaBNVSL)mat08039714 035 $a(IDAMS)0b00006485f0d8fb 035 $a(IEEE)8039714 035 $a(OCoLC)93886895 035 $a(PPN)11700006X 035 $a(EXLCZ)991000000000327274 100 $a20171024d2008 uy 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity for wireless ad hoc networks /$fFarooq Anjum and Petros Mouchtaris 210 1$aHoboken, New Jersey :$cWiley-Interscience,$dc2007. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2006] 215 $a1 online resource (265 p.) 300 $aDescription based upon print version of record. 311 $a0-471-75688-1 320 $aIncludes bibliographical references (p. 234-244) and index. 327 $aPreface -- Foreword -- Acknowledgments -- 1 Introduction -- 1.1 Definition of Wireless Ad Hoc Networks -- 1.2 Applications of Wireless Ad Hoc Networks -- 1.3 Threats, Attacks, and Vulnerabilities -- 1.3.1 Threats -- 1.3.2 Vulnerabilities in Ad Hoc Networks -- 1.3.3 Attacks -- 1.4 Overview of the Book -- 2 Basic Security Concepts -- 2.1 Introduction -- 2.2 Basic Concepts -- 2.2.1 Attributes -- 2.2.2 Cryptographic Primitives -- 2.3 Modes of Operation -- 2.4 Miscellaneous Properties -- 2.4.1 One-Way Property of Hash Chains -- 2.4.2 TESLA -- 2.5 Summary -- 3 Key Management -- 3.1 Introduction -- 3.2 Traditional Solution -- 3.3 Solutions for Ad Hoc Networks -- 3.3.1 Asymmetric Key-Based Approach -- 3.3.2 Symmetric Key-Based Approach -- 3.4 Summary -- 4 Secure Routing -- 4.1 Introduction -- 4.1.1 Distance-Vector and Link-State Routing -- 4.1.2 Proactive vs Reactive Routing -- 4.2 Ad Hoc On-Demand Distance Vector -- 4.2.1 Secure AODV -- 4.2.2 Authenticated Routing for Ad Hoc Networks (ARAN) -- 4.2.3 Security-Aware Ad Hoc Routing -- 4.3 Dynamic Source Routing Protocol -- 4.3.1 Secure Routing Protocol -- 4.3.2 Ariadne -- 4.3.3 EndairA: A Provably Secure Routing Protocol -- 4.4 Destination-Sequenced Distance-Vector Routing Protocol -- 4.4.1 Secure Efficient Distance Vector Routing (SEAD) -- 4.4.2 SuperSEAD -- 4.4.3 S-DSDV -- 4.5 Optimized Link-State Routing Protocol -- 4.5.1 Secure Extension to OLSR -- 4.5.2 Secure Link-State Routing Protocol -- 4.6 Anonymous Routing Protocols -- 4.6.1 ANODR -- 4.6.2 MASK -- 4.7 Generic Attacks Against Routing -- 4.7.1 Wormhole Attacks -- 4.7.2 Rushing Attacks -- 4.7.3 Sybil Attacks -- 4.8 Summary -- 5 Intrusion Detection Systems -- 5.1 Introduction -- 5.1.1 Traditional IDS Systems -- 5.2 Unique IDS Challenges in MANET -- 5.3 Threat Model -- 5.4 Architecture for Intrusion Detection in MANET -- 5.4.1 Noncollaborative Intrusion Detection System -- 5.4.2 Cooperative Intrusion Detection -- 5.4.3 Key Novel Concepts for Cooperative Intrusion Detection in MANET. 327 $a5.5 Evidence Collection -- 5.5.1 Local Evidence -- 5.5.2 Promiscuous Monitoring -- 5.5.3 Evidence made Available by Other Nodes -- 5.6 Detection of Specific Attacks -- 5.6.1 Detection of Packet Dropping Attacks -- 5.6.2 Detection of Attacks Against Routing Protocols -- 5.7 Summary -- 6 Policy Management -- 6.1 Introduction -- 6.2 Policy-Based Network Management -- 6.2.1 Overview -- 6.2.2 Architecture -- 6.2.3 Policy Languages -- 6.2.4 Distributed Policy Management Architecture -- 6.2.5 IETF and DMTF Standardization Activities -- 6.3 Application of Policy Management to Security Management -- 6.3.1 Role-Based Access Control (RBAC) -- 6.3.2 Trust Management and the KeyNote System -- 6.3.3 Firewall Management -- 6.3.4 Policy Enforcement in a Wireless Ad Hoc Network -- 6.4 Summary -- 7 Secure Localization -- 7.1 Introduction -- 7.2 Localization -- 7.2.1 Ranging -- 7.2.2 Computation -- 7.2.3 Attacks -- 7.3 Secure Localization -- 7.3.1 Distance Bounding Techniques -- 7.3.2 Verifiable Multilateration -- 7.3.3 Directional Antennae-Based Schemes -- 7.3.4 Transmission Range Variation-Based Schemes -- 7.3.5 Hybrid Schemes -- 7.3.6 Malicious Beacons -- 7.4 Summary -- 8 Conclusions and Future Research -- 8.1 Vehicular Networks -- 8.1.1 Differences with MANET -- 8.1.2 Open Problems and Solutions -- 8.2 Summary -- Acronyms -- References -- Index. 330 $aAn examination of unique security problems posed by wireless ad hoc networks and their solutions Security for Wireless Ad hoc Networks helps pave the way for the commercialization of wireless ad hoc networks by addressing the unique security risks that these networks raise. The author team offers a critical analysis of existing research findings and also discusses the direction and preliminary findings of ongoing research. Readers learn the advantages and disadvantages of the leading proposed security schemes. Moreover, readers are given the tools they need to assess the security implications of the protocols they design. This text begins with a discussion outlining the threats, attacks, and vulnerabilities inherent in ad hoc wireless networks. Next, the authors introduce basic security concepts that serve as a foundation for the text's examination of strategies and techniques forsecuring the network. Among the topics presented are: . Basic cryptography mechanisms. Key management. Secure routing. Intrusion detection. Security policy management. Secure location determination Given both the promise and the risk associated with wireless ad hoc networks, this text is essential reading for all engineers and other professionals tasked with designing and securing wireless ad hoc networks. 606 $aWireless LANs$xSecurity measures 615 0$aWireless LANs$xSecurity measures. 676 $a005.8 676 $a621.38212 700 $aAnjum$b Farooq$01621359 701 $aMouchtaris$b Petros$01621360 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910830453203321 996 $aSecurity for wireless ad hoc networks$93954602 997 $aUNINA