eBooks-it.org Logo
eBooks-IT.org Inner Image

Security in Wireless Mesh Networks

Security in Wireless Mesh Networks Image

Book Details:

Publisher:Auerbach Publications
Series: CRC Press
Author:Yan Zhang
Edition:1
ISBN-10:0849382505
ISBN-13:9780849382505
Pages:552
Published:Aug 21 2008
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:10.05 MB

Book Description:

Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. To achieve these aims, security mechanisms are essential to ensure trusted on-going communications. Security in Wireless Mesh Networks explores key security challenges set in diverse scenarios, as well as emerging standards that include authentication, access control and authorization, attacks, privacy and trust, encryption, key management, identity management, DoS attacks, intrusion detection and prevention, secure routing, and security policies. The book also examines security mechanisms in IEEE 802.11, IEEE 802.15, IEEE 802.16, and IEEE 802.20 standards. In addition, it provides numerous case studies and applications to facilitate understanding. As a single, comprehensive guide to security-related issues in WMN, this book is an important resource to have if you are working on the design, selection, and implementation of wireless mesh networks and system components.

Download Link:

Related Books:

Networked Filtering and Fusion in Wireless Sensor Networks

Networked Filtering and Fusion in Wireless Sensor Networks Image
By exploiting the synergies among available data, information fusion can reduce data traffic, filter noisy measurements, and make predictions and inferences about a monitored entity. Networked Filtering and Fusion in Wireless Sensor Networks introduces the subject of multi-sensor fusion as the method of choice for implementing distributed systems.The book examines the state of the art in information fusion. It presents the known methods, algorithms, architectures, and models of information fusion and discusses their applicability in the context of wireless sensor networks (WSNs). Paying particular attention to the wide range of topics that have been covered in recent literature, the text presents the results of a number of typical case studies.Comple...

Physical Layer Security in Wireless Communications

Physical Layer Security in Wireless Communications Image
Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting the physical layer properties of the communication system, such as thermal noise, interference, and the time-varying nature of fading channels.Written by pioneering researchers, Physical Layer Security in Wireless Communications supplies a systematic overview of the basic concepts, recent advancements, and open issues in providing communication security at the physical layer. It introduces the key concepts, design issues, and solutions to physical layer securit...

Spectrum Sharing in Wireless Networks

Fairness, Efficiency and Security
Spectrum Sharing in Wireless Networks Image
Spectrum Sharing in Wireless Networks: Fairness, Efficiency, and Security provides a broad overview of wireless network spectrum sharing in seven distinct sections: The first section examines the big picture and basic principles, explaining the concepts of spectrum sharing, hardware/software function requirements for efficient sharing, and future trends of sharing strategies. The second section contains more than 10 chapters that discuss differing approaches to efficient spectrum sharing. The authors introduce a new coexistence and sharing scheme for multi-hop networks, describe the space-time sharing concept, introduce LTE-U, and examine sharing in broadcast and unicast environments. They then talk about different cooperation strategies to achieve m...



2007 - 2021 © eBooks-IT.org