Handbook of Research on Wireless Security
Yan Zhang, Jun Zheng (Ph.D.), Miao Ma
IGI Global Snippet, Jan 1, 2008 - Technology & Engineering - 860 pages
Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to society. The Handbook of Research on Wireless Security combines research from over 100 esteemed experts from 23 countries on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security. As an innovative and current reference source for students, educators, faculty members, researchers, engineers in the field of wireless security, this handbook will make an invaluable addition to any library collection.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
3GPP AAA protocol access control ad hoc networks adversary agent algorithm anonymous applications approach attacks authentication protocol base station Bluetooth certificate chapter cipher client communication Computer confidentiality connectivity context credentials cryptographic deployed deployment Diameter distributed dynamic EAP-AKA EAP-SIM EAP-TLS encryption entity environment Figure function GPRS hash hoc networks identity IEEE implementation infrastructure integrity interface Internet intrusion detection IPsec key management layer malicious malware MANETs mobile ad hoc mobile devices multimedia operations packet Paper presented performance problem proposed protection public key radio RADIUS request requirements Retrieved routing protocols scenario scheme secure routing security mechanisms sensor nodes service providers session key SGSN shared solutions specific standard Sybil attack techniques tion topology traffic transmission trust UMTS user’s vulnerabilities watermarking WiMAX wireless networks wireless sensor networks WLAN