This book identifies the vulnerabilities at the physical layer, MAC layer, IP layer, the transport layer and software program layer, wireless networks and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, routing protocols secure MAC/PHY, attacks and prevention, immunization, key management, secure group communications and multicast services, safe location, monitoring and surveillance, anonymity, privacy, trust creation and management, redundancy and security and reputable wireless networking. From the back cover This timely volume,more info, Wireless network security, provides extensive coverage of wireless security difficulties for example cryptographic coprocessors, encryption, key management, authentication, attacks and countermeasures, secure routing, secure media access control, intrusion detection, epidemics, safety performance analysis, security issues in applications and a lot more. Contributions identify several vulnerabilities in physical layer, MAC layer, IP layer, and transport layer computer software layer and focus on ways to strengthen security mechanisms and services in the levels. The book includes 15 chapters rigorously arbitrated by eminent international researchers working in this area. The material serves like a useful reference for researchers, graduate students, and professional issues seeking items for wireless and cellular security.
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment