Security for wireless ad hoc networks:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
Wiley Interscience
c2007
|
Schlagworte: | |
Online-Zugang: | Table of contents only Publisher description Contributor biographical information Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references (p. 234-244) and index |
Beschreibung: | XV, 247 S. graph. Darst. |
ISBN: | 0471756881 9780471756880 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV023171736 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 080219s2007 xxud||| |||| 00||| eng d | ||
010 | |a 2006029342 | ||
015 | |a GBA696264 |2 dnb | ||
020 | |a 0471756881 |9 0-471-75688-1 | ||
020 | |a 9780471756880 |9 978-0-471-75688-0 | ||
035 | |a (OCoLC)71244044 | ||
035 | |a (DE-599)BVBBV023171736 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-1051 |a DE-11 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Anjum, Farooq |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security for wireless ad hoc networks |c Farooq Anjum and Petros Mouchtaris |
264 | 1 | |a Hoboken, NJ |b Wiley Interscience |c c2007 | |
300 | |a XV, 247 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references (p. 234-244) and index | ||
650 | 4 | |a Wireless LANs |x Security measures | |
650 | 0 | 7 | |a Ad-hoc-Netz |0 (DE-588)4674811-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Ad-hoc-Netz |0 (DE-588)4674811-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Mouchtaris, Petros |e Sonstige |4 oth | |
856 | 4 | |u http://www.loc.gov/catdir/toc/ecip0620/2006029342.html |3 Table of contents only | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0740/2006029342-d.html |3 Publisher description | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0740/2006029342-b.html |3 Contributor biographical information | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016358403&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016358403 |
Datensatz im Suchindex
_version_ | 1804137434232913920 |
---|---|
adam_text | CONTENTS
Preface xi
Foreword xiii
Acknowledgments xv
1 Introduction 1
1.1 Definition of Wireless Ad Hoc Networks 1
1.2 Applications of Wireless Ad Hoc Networks 5
1.3 Threats, Attacks, and Vulnerabilities 7
1.3.1 Threats 8
1.3.2 Vulnerabilities in Ad Hoc Networks 9
1.3.3 Attacks 10
1.4 Overview of the Book 13
2 Basic Security Concepts 15
2.1 Introduction 15
2.2 Basic Concepts 16
2.2.1 Attributes 16
2.2.2 Cryptographic Primitives 18
2.3 Modes of Operation 30
2.4 Miscellaneous Properties 34
2.4.1 One-Way Property of Hash Chains 35
2.4.2 TESLA 35
2.5 Summary 38
3 Key Management 39
3.1 Introduction 39
3.2 Traditional Solution 40
3.3 Solutions for Ad Hoc Networks 44
3.3.1 Asymmetrie Key-Based Approach 44
3.3.2 Symmetrie Key-Based Approach 49
3.4 Summary 68
1 vii
!
4 Secure Routing 69
4.1 Introduction 69
4.1.1 Distance-Vector and Link-State Routing 69
4.1.2 Proactive vs Reactive Routing 70
4.2 Ad Hoc On-Demand Distance Vector 72
4.2.1 Secure AODV 73
4.2.2 Authenticated Routing for Ad Hoc
Networks (ARAN) 77
4.2.3 Security-Aware Ad Hoc Routing 79
4.3 Dynamic Source Routing Protocol 80
4.3.1 Secure Routing Protocol 81
4.3.2 Ariadne 84
4.3.3 EndairA: A Provably Secure Routing Protocol 90
4.4 Destination-Sequenced Distance-Vector Routing Protocol 91
4.4.1 Secure Efficient Distance Vector Routing (SEAD) 92
4.4.2 SuperSEAD 95
4.4.3 S-DSDV 98
4.5 Optimized Link-State Routing Protocol 99
4.5.1 Secure Extension to OLSR 101
4.5.2 Secure Link-State Routing Protocol 103
4.6 Anonymous Routing Protocols 105
4.6.1 ANODR 106
4.6.2 MASK 109
4.7 Generic Attacks Against Routing 113
4.7.1 Wormhole Attacks 113
4.7.2 Rushing Attacks 117
4.7.3 Sybil Attacks 118
4.8 Summary 119
5 Intrusion Detection Systems 120
5.1 Introduction 120
5.1.1 Traditional IDS Systems 121
5.2 Unique IDS Challenges in MANET 126
5.3 Threat Model 127
5.4 Architecture for Intrusion Detection in MANET 129
5.4.1 Noncollaborative Intrusion Detection System 131
5.4.2 Cooperative Intrusion Detection 135
5.4.3 Key Novel Concepts for Cooperative Intrusion
Detection in MANET 140
5.5 Evidence Collection 148
5.5.1 Local Evidence 148
5.5.2 Promiscuous Monitoring 149
5.5.3 Evidence made Available by Other Nodes 150
5.6 Detection of Specific Attacks 151
5.6.1 Detection of Packet Dropping Attacks 151
5.6.2 Detection of Attacks Against Routing Protocols 155
5.7 Summary 159
6 Policy Management 160
6.1 Introduction 160
6.2 Policy-Based Network Management 162
6.2.1 Overview 162
6.2.2 Architecture 163
6.2.3 Policy Languages 165
6.2.4 Distributed Policy Management Architecture 170
6.2.5 IETF and DMTF Standardization Activities 176
6.3 Application of Policy Management to Security
Management 178
6.3.1 Role-Based Access Control (RBAC) 178
6.3.2 Trust Management and the KeyNote System 178
6.3.3 Firewall Management 180
6.3.4 Policy Enforcement in a Wireless Ad Hoc Network 181
6.4 Summary 183
7 Secure Localization 185
7.1 Introduction 185
7.2 Localization 187
7.2.1 Ranging 189
7.2.2 Computation 199
7.2.3 Attacks 202
7.3 Secure Localization 203
7.3.1 Distance Bounding Techniques 204
7.3.2 Verifiable Multilateration 208
7.3.3 Directional Antennae-Based Schemes 211
7.3.4 Transmission Range Variation-Based Schemes 216
7.3.5 Hybrid Schemes 220
7.3.6 Malicious Beacons 221
7.4 Summary 223
8 Conclusions and Future Research 224
8.1 Vehicular Networks 225
8.1.1 Differences with MANET 227
8.1.2 Open Problems and Solutions 228
8.2 Summary 230
Acronyms 231
References 234
Index 245
|
adam_txt |
CONTENTS
Preface xi
Foreword xiii
Acknowledgments xv
1 Introduction 1
1.1 Definition of Wireless Ad Hoc Networks 1
1.2 Applications of Wireless Ad Hoc Networks 5
1.3 Threats, Attacks, and Vulnerabilities 7
1.3.1 Threats 8
1.3.2 Vulnerabilities in Ad Hoc Networks 9
1.3.3 Attacks 10
1.4 Overview of the Book 13
2 Basic Security Concepts 15
2.1 Introduction 15
2.2 Basic Concepts 16
2.2.1 Attributes 16
2.2.2 Cryptographic Primitives 18
2.3 Modes of Operation 30
2.4 Miscellaneous Properties 34
2.4.1 One-Way Property of Hash Chains 35
2.4.2 TESLA 35
2.5 Summary 38
3 Key Management 39
3.1 Introduction 39
3.2 Traditional Solution 40
3.3 Solutions for Ad Hoc Networks 44
3.3.1 Asymmetrie Key-Based Approach 44
3.3.2 Symmetrie Key-Based Approach 49
3.4 Summary 68
1 vii
!
4 Secure Routing 69
4.1 Introduction 69
4.1.1 Distance-Vector and Link-State Routing 69
4.1.2 Proactive vs Reactive Routing 70
4.2 Ad Hoc On-Demand Distance Vector 72
4.2.1 Secure AODV 73
4.2.2 Authenticated Routing for Ad Hoc
Networks (ARAN) 77
4.2.3 Security-Aware Ad Hoc Routing 79
4.3 Dynamic Source Routing Protocol 80
4.3.1 Secure Routing Protocol 81
4.3.2 Ariadne 84
4.3.3 EndairA: A Provably Secure Routing Protocol 90
4.4 Destination-Sequenced Distance-Vector Routing Protocol 91
4.4.1 Secure Efficient Distance Vector Routing (SEAD) 92
4.4.2 SuperSEAD 95
4.4.3 S-DSDV 98
4.5 Optimized Link-State Routing Protocol 99
4.5.1 Secure Extension to OLSR 101
4.5.2 Secure Link-State Routing Protocol 103
4.6 Anonymous Routing Protocols 105
4.6.1 ANODR 106
4.6.2 MASK 109
4.7 Generic Attacks Against Routing 113
4.7.1 Wormhole Attacks 113
4.7.2 Rushing Attacks 117
4.7.3 Sybil Attacks 118
4.8 Summary 119
5 Intrusion Detection Systems 120
5.1 Introduction 120
5.1.1 Traditional IDS Systems 121
5.2 Unique IDS Challenges in MANET 126
5.3 Threat Model 127
5.4 Architecture for Intrusion Detection in MANET 129
5.4.1 Noncollaborative Intrusion Detection System 131
5.4.2 Cooperative Intrusion Detection 135
5.4.3 Key Novel Concepts for Cooperative Intrusion
Detection in MANET 140
5.5 Evidence Collection 148
5.5.1 Local Evidence 148
5.5.2 Promiscuous Monitoring 149
5.5.3 Evidence made Available by Other Nodes 150
5.6 Detection of Specific Attacks 151
5.6.1 Detection of Packet Dropping Attacks 151
5.6.2 Detection of Attacks Against Routing Protocols 155
5.7 Summary 159
6 Policy Management 160
6.1 Introduction 160
6.2 Policy-Based Network Management 162
6.2.1 Overview 162
6.2.2 Architecture 163
6.2.3 Policy Languages 165
6.2.4 Distributed Policy Management Architecture 170
6.2.5 IETF and DMTF Standardization Activities 176
6.3 Application of Policy Management to Security
Management 178
6.3.1 Role-Based Access Control (RBAC) 178
6.3.2 Trust Management and the KeyNote System 178
6.3.3 Firewall Management 180
6.3.4 Policy Enforcement in a Wireless Ad Hoc Network 181
6.4 Summary 183
7 Secure Localization 185
7.1 Introduction 185
7.2 Localization 187
7.2.1 Ranging 189
7.2.2 Computation 199
7.2.3 Attacks 202
7.3 Secure Localization 203
7.3.1 Distance Bounding Techniques 204
7.3.2 Verifiable Multilateration 208
7.3.3 Directional Antennae-Based Schemes 211
7.3.4 Transmission Range Variation-Based Schemes 216
7.3.5 Hybrid Schemes 220
7.3.6 Malicious Beacons 221
7.4 Summary 223
8 Conclusions and Future Research 224
8.1 Vehicular Networks 225
8.1.1 Differences with MANET 227
8.1.2 Open Problems and Solutions 228
8.2 Summary 230
Acronyms 231
References 234
Index 245 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Anjum, Farooq |
author_facet | Anjum, Farooq |
author_role | aut |
author_sort | Anjum, Farooq |
author_variant | f a fa |
building | Verbundindex |
bvnumber | BV023171736 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 200 ST 277 |
ctrlnum | (OCoLC)71244044 (DE-599)BVBBV023171736 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02141nam a2200517zc 4500</leader><controlfield tag="001">BV023171736</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080219s2007 xxud||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2006029342</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA696264</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471756881</subfield><subfield code="9">0-471-75688-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780471756880</subfield><subfield code="9">978-0-471-75688-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)71244044</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023171736</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1051</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Anjum, Farooq</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security for wireless ad hoc networks</subfield><subfield code="c">Farooq Anjum and Petros Mouchtaris</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley Interscience</subfield><subfield code="c">c2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 247 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 234-244) and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless LANs</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ad-hoc-Netz</subfield><subfield code="0">(DE-588)4674811-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Ad-hoc-Netz</subfield><subfield code="0">(DE-588)4674811-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mouchtaris, Petros</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/ecip0620/2006029342.html</subfield><subfield code="3">Table of contents only</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0740/2006029342-d.html</subfield><subfield code="3">Publisher description</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0740/2006029342-b.html</subfield><subfield code="3">Contributor biographical information</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016358403&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016358403</subfield></datafield></record></collection> |
id | DE-604.BV023171736 |
illustrated | Illustrated |
index_date | 2024-07-02T19:58:00Z |
indexdate | 2024-07-09T21:12:14Z |
institution | BVB |
isbn | 0471756881 9780471756880 |
language | English |
lccn | 2006029342 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016358403 |
oclc_num | 71244044 |
open_access_boolean | |
owner | DE-1051 DE-11 |
owner_facet | DE-1051 DE-11 |
physical | XV, 247 S. graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Wiley Interscience |
record_format | marc |
spelling | Anjum, Farooq Verfasser aut Security for wireless ad hoc networks Farooq Anjum and Petros Mouchtaris Hoboken, NJ Wiley Interscience c2007 XV, 247 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references (p. 234-244) and index Wireless LANs Security measures Ad-hoc-Netz (DE-588)4674811-8 gnd rswk-swf Drahtloses lokales Netz (DE-588)4633975-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Drahtloses lokales Netz (DE-588)4633975-9 s Computersicherheit (DE-588)4274324-2 s Ad-hoc-Netz (DE-588)4674811-8 s DE-604 Mouchtaris, Petros Sonstige oth http://www.loc.gov/catdir/toc/ecip0620/2006029342.html Table of contents only http://www.loc.gov/catdir/enhancements/fy0740/2006029342-d.html Publisher description http://www.loc.gov/catdir/enhancements/fy0740/2006029342-b.html Contributor biographical information HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016358403&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Anjum, Farooq Security for wireless ad hoc networks Wireless LANs Security measures Ad-hoc-Netz (DE-588)4674811-8 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4674811-8 (DE-588)4633975-9 (DE-588)4274324-2 |
title | Security for wireless ad hoc networks |
title_auth | Security for wireless ad hoc networks |
title_exact_search | Security for wireless ad hoc networks |
title_exact_search_txtP | Security for wireless ad hoc networks |
title_full | Security for wireless ad hoc networks Farooq Anjum and Petros Mouchtaris |
title_fullStr | Security for wireless ad hoc networks Farooq Anjum and Petros Mouchtaris |
title_full_unstemmed | Security for wireless ad hoc networks Farooq Anjum and Petros Mouchtaris |
title_short | Security for wireless ad hoc networks |
title_sort | security for wireless ad hoc networks |
topic | Wireless LANs Security measures Ad-hoc-Netz (DE-588)4674811-8 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Wireless LANs Security measures Ad-hoc-Netz Drahtloses lokales Netz Computersicherheit |
url | http://www.loc.gov/catdir/toc/ecip0620/2006029342.html http://www.loc.gov/catdir/enhancements/fy0740/2006029342-d.html http://www.loc.gov/catdir/enhancements/fy0740/2006029342-b.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016358403&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT anjumfarooq securityforwirelessadhocnetworks AT mouchtarispetros securityforwirelessadhocnetworks |