您好,欢迎光临本网站![请登录][注册会员]  
文件名称: Security in Wireless Ad Hoc and Sensor Networks.pdf
  所属分类: 其它
  开发工具:
  文件大小: 5mb
  下载次数: 0
  上传时间: 2019-08-14
  提 供 者: drji*****
 详细说明: Contents AbouttheAuthors xiii Preface xv Acknowledgements xvii ListofAcronyms xix PartOne WirelessAdHoc,SensorandMeshNetworking 1 1Introduction 3 1.1 InformationSecurity 4 1.1.1 ComputerSecurity 4 1.1.2 CommunicationsSecurity 5 1.2 ScopeoftheBook 5 1.3 StructureoftheBook 6 1.4 ElectronicResourcesfortheBook 7 1.5 ReviewQuestions 7 2W irelessAdHoc,SensorandMeshNetworks 9 2.1 AdHocNetworksandApplications 10 2.1.1 ApplicationExamples 10 2.1.2 Challenges 11 2.2 SensorandActuatorNetworks 13 2.2.1 ApplicationExamples 14 2.2.2 Challenges 15 2.3 MeshNetworks 17 2.3.1 ApplicationExamples 18 2.3.2 Challenges 19 2.4 TacticalCommunicationsandNetworks 19 2.4.1 BlueForceTrackingSystem 22 2.5 FactorsInfluencingtheDesignofWirelessAdHoc,SensorandMesh Networks 23 2.5.1 WirelessMedium 24 2.5.2 NetworkingRegime 25 viii Contents 2.5.3 NatureofTraffic 26 2.5.4 QualityofServiceRequirements 26 2.5.5 Mobility 26 2.5.6 FaultTolerance 27 2.5.7 OperatingEnvironment 27 2.5.8 PowerEfficiencyRequirements 27 2.5.9 Scalability 27 2.5.10 HardwareRequirementsandProductionCost 27 2.6 ReviewQuestions 28 3TheWirelessMedium 29 3.1 WirelessChannelFundamentalsandSecurity 29 3.1.1 Capacity 31 3.1.2 ElectromagneticSpectrum 32 3.1.3 PathLossandAttenuation 35 3.1.4 OtherTransmissionImpairmentsandJamming 36 3.1.5 ModulationandDemodulation 38 3.1.6 ManchesterEncoding 41 3.1.7 MultiplexingandDuplexing 42 3.2 AdvancedRadioTechnologies 43 3.2.1 DirectionalandSmartAntennas 43 3.2.2 SoftwareRadios 44 3.2.3 CognitiveRadios 44 3.2.4 Multiradio/MultichannelSystems 45 3.2.5 MIMOSystems 45 3.3 ReviewQuestions 45 4MediumAccessandErrorControl 47 4.1 MediumAccessControl 47 4.1.1 GenericMACProtocols 47 4.1.2 MACProtocolsforWirelessAdHoc,SensorandMesh Networks 51 4.2 ErrorControl 53 4.2.1 ErrorCorrection 54 4.2.2 ErrorDetection 56 4.3 WirelessMetropolitanAreaNetworks 58 4.3.1 IEEE802.16 58 4.3.2 WiMAX 58 4.4 WirelessLocalAreaNetworks 59 4.4.1 IEEE802.11 59 4.4.2 Wi-Fi 60 4.5 WirelessPersonalAreaNetworks 60 4.5.1 IEEE802.15.1 60 4.5.2 Bluetooth 61 4.5.3 IEEE802.15.4 62 Contents ix 4.5.4 ZigBee 62 4.5.5 WiMedia 63 4.6 ReviewQuestions 64 5Routing 65 5.1 InternetProtocolandMobileIP 65 5.1.1 IPv4,IPv6andSecurityinIP 65 5.1.2 DistanceVectorandLinkStateAlgorithms 68 5.1.3 Internetworking 70 5.1.4 Multicasting,Geocasting,Anycastingand Broadcasting 71 5.1.5 MobileIP 71 5.2 RoutinginWirelessAdHocNetworks 72 5.2.1 FloodingandGossiping 73 5.2.2 AdHocOn-demandDistanceVectorRouting(AODV) 73 5.2.3 DynamicSourceRouting 74 5.3 RoutinginWirelessSensorandActuatorNetworks 75 5.3.1 DirectedDiffusion 75 5.3.2 SensorProtocolsforInformationviaNegotiation (SPIN) 76 5.3.3 Low-EnergyAdaptiveClusteringHierarchy (LEACH) 76 5.3.4 Power-AwareMany-to-ManyRouting(PAMR) 77 5.4 ReviewQuestions 79 6Reliability,FlowandCongestionControl 81 6.1 Reliability 81 6.1.1 Non-Acknowledgement-BasedSchemes 83 6.1.2 Acknowledgement-BasedSchemes 84 6.2 FlowandCongestionControl 85 6.3 ReviewQuestions 88 7OtherChallengesandSecurityAspects 89 7.1 LocalizationandPositioning 89 7.2 TimeSynchronization 93 7.3 Addressing 95 7.4 DataAggregationandFusion 96 7.5 DataQuerying 97 7.5.1 DatabaseApproach 97 7.5.2 TaskSets 99 7.5.3 OtherData-QueryingSchemes 99 7.6 Coverage 100 7.7 MobilityManagement 101 7.8 Cross-layerDesign 102 7.9 ReviewQuestions 103 x Contents PartTwo SecurityinWirelessAdHoc,SensorandMeshNetworking 105 8SecurityAttacksinAdHoc,SensorandMeshNetworks 107 8.1 SecurityAttacks 107 8.1.1 PassiveAttacks 107 8.1.2 ActiveAttacks 109 8.2 Attackers 117 8.3 SecurityGoals 119 8.4 ReviewQuestions 119 9Cryptography 121 9.1 SymmetricEncryption 121 9.2 AsymmetricEncryption 127 9.3 HashFunctionsandMessageAuthenticationCode 131 9.4 CascadingHashing 136 9.4.1 HashChains 137 9.4.2 HashTrees 137 9.4.3 TESLA 138 9.5 ReviewQuestions 140 10ChallengesandSolutions:BasicIssues 143 10.1BootstrappingSecurityinAdHocNetworks 144 10.2BootstrappingSecurityinSensorNetworks 145 10.3KeyDistribution,ExchangeandManagement 146 10.3.1 Standards 147 10.3.2 ClassificationofKeyManagementSchemes 147 10.3.3 ContributorySchemes 148 10.3.4 DistributiveSchemes 153 10.4AuthenticationIssues 171 10.5Integrity 171 10.6ReviewQuestions 172 11ChallengesandSolutions:Protection 173 11.1PrivacyandAnonymity 173 11.2IntrusionDetection 174 11.2.1 ArchitecturesforIDSinWirelessAdHocNetworks 175 11.3DefenseAgainstTrafficAnalysis 177 11.4AccessControlandSecureHuman–ComputerInteraction 177 11.5Software-BasedAnti-TamperTechniques 179 11.5.1 EncryptionWrappers 180 11.5.2 CodeObfuscation 181 11.5.3 SoftwareWatermarkingandFingerprinting 181 11.5.4 Guarding 182 11.6TamperResilience:HardwareProtection 183 11.7AvailabilityandPlausibility 184 11.8ReviewQuestions 185 Contents xi 12SecureRouting 187 12.1DefenseAgainstSecurityAttacksinAdHocRouting 187 12.1.1 TechniquesAgainstWormholeAttacks 188 12.1.2 TechniquesAgainstSybilAttacks 189 12.1.3 TechniquesAgainstSelectiveForwarding 189 12.1.4 SecureRoutinginSensorNetworks 190 12.1.5 RoutingSchemesThatEnhanceSecurity 191 12.2SecureAdHocRoutingProtocols 192 12.2.1 Intrusion-TolerantRoutinginWirelessSensorNetworks (INSENS) 193 12.2.2 AuthenticatedRoutingforAdHocNetworking(ARAN) 195 12.2.3 On-DemandSecureAdHocRouting(ARIADNE) 197 12.2.4 WatchdogPathrater 199 12.2.5 SecureAdHocOn-DemandDistanceVector(SAODV) 199 12.2.6 SecureLinkStateRoutingProtocol(SLSP) 200 12.3FurtherReading 201 12.4ReviewQuestions 202 13SpecificChallengesandSolutions 203 13.1SPINS:SecurityProtocolsforSensorNetworks 203 13.1.1 SNEP 204 13.1.2 μTESLA 205 13.2QuarantineRegionSchemeforSpamAttacks 205 13.3SecureChargingandRewardingScheme 209 13.3.1 EstablishingaSession 210 13.3.2 PacketDelivery 211 13.3.3 AcknowledgingDelivery 212 13.3.4 TerminatingaSession 212 13.4SecureNodeLocalization 213 13.4.1 DetectionofMaliciousBeaconNodesandReplayedBeacon Signals 213 13.4.2 Attack-ResistantLocationEstimation 215 13.5SecureTimeSynchronization 216 13.6SecureEventandEventBoundaryDetection 217 13.6.1 Stage1:DetectionofFaultyNodes 217 13.6.2 Stage2:DetectionofEventBoundaryNodes 219 13.6.3 Stage3:ImprovementofEventBoundaryNode Detection 220 13.7ReviewQuestions 220 14InformationOperationsandElectronicWarfare 221 14.1ElectronicSupport 223 14.2ElectronicAttack 224 14.3ElectronicProtection 225 14.4ReviewQuestions 225 xii Contents 15Standards 227 15.1X.800andRFC2828 227 15.1.1 SecurityThreatsandAttacks 227 15.1.2 SecurityServices 228 15.1.3 SecurityMechanisms 230 15.1.4 RelationshipsbetweenSecurityServicesandMechanisms 231 15.1.5 PlacementsofSecurityServicesandMechanisms 231 15.2WiredEquivalentPrivacy(WEP) 231 15.2.1 HowDoesWEPWork? 231 15.2.2 WEPWeaknesses 236 15.3Wi-FiProtectedAccess(WPA) 239 15.3.1 HowDoesWPAWork? 239 15.3.2 WEPandWPAComparison 242 15.3.3 WPA2 242 References 245 Index
(系统自动生成,下载前可以参看下载内容)

下载文件列表

相关说明

  • 本站资源为会员上传分享交流与学习,如有侵犯您的权益,请联系我们删除.
  • 本站是交换下载平台,提供交流渠道,下载内容来自于网络,除下载问题外,其它问题请自行百度
  • 本站已设置防盗链,请勿用迅雷、QQ旋风等多线程下载软件下载资源,下载后用WinRAR最新版进行解压.
  • 如果您发现内容无法下载,请稍后再次尝试;或者到消费记录里找到下载记录反馈给我们.
  • 下载后发现下载的内容跟说明不相乎,请到消费记录里找到下载记录反馈给我们,经确认后退回积分.
  • 如下载前有疑问,可以通过点击"提供者"的名字,查看对方的联系方式,联系对方咨询.
 相关搜索:
 输入关键字,在本站1000多万海量源码库中尽情搜索: