Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing
This is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their implications explained in terms of security and cooperation, and potential malicious and selfish misdeeds are described along with the existing...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge
Cambridge University Press
2008
|
Schlagworte: | |
Online-Zugang: | BSB01 FHN01 Volltext |
Zusammenfassung: | This is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their implications explained in terms of security and cooperation, and potential malicious and selfish misdeeds are described along with the existing and future security techniques. Fundamental questions of security including user and device identification; establishment of security association; secure and cooperative routing in multi-hop networks; fair bandwidth distribution; and privacy protection are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor, and RFID networks. Important relationships between trust, security, and cooperation are also discussed. Contains homework problems and tutorials on cryptography and game theory. This text is suitable for advanced undergraduates and graduate students of electrical engineering and computer science, and researchers and practitioners in the wireless industry. Lecture slides and instructor-only solutions available online (www.cambridge.org/9780521873710) |
Beschreibung: | Title from publisher's bibliographic system (viewed on 05 Oct 2015) |
Beschreibung: | 1 online resource (xvii, 485 pages) |
ISBN: | 9780511815102 |
DOI: | 10.1017/CBO9780511815102 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043942896 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 161206s2008 |||| o||u| ||||||eng d | ||
020 | |a 9780511815102 |c Online |9 978-0-511-81510-2 | ||
024 | 7 | |a 10.1017/CBO9780511815102 |2 doi | |
035 | |a (ZDB-20-CBO)CR9780511815102 | ||
035 | |a (OCoLC)967685091 | ||
035 | |a (DE-599)BVBBV043942896 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-92 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Buttyán, Levente |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security and cooperation in wireless networks |b thwarting malicious and selfish behavior in the age of ubiquitous computing |c Levente Buttyan, Jean-Pierre Hubaux |
246 | 1 | 3 | |a Security & Cooperation in Wireless Networks |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2008 | |
300 | |a 1 online resource (xvii, 485 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from publisher's bibliographic system (viewed on 05 Oct 2015) | ||
505 | 8 | |a pt. I: Introduction -- pt. II: Thwarting Malicious Behavior -- pt. III: Thwarting Selfish Behavior | |
520 | |a This is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their implications explained in terms of security and cooperation, and potential malicious and selfish misdeeds are described along with the existing and future security techniques. Fundamental questions of security including user and device identification; establishment of security association; secure and cooperative routing in multi-hop networks; fair bandwidth distribution; and privacy protection are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor, and RFID networks. Important relationships between trust, security, and cooperation are also discussed. Contains homework problems and tutorials on cryptography and game theory. This text is suitable for advanced undergraduates and graduate students of electrical engineering and computer science, and researchers and practitioners in the wireless industry. Lecture slides and instructor-only solutions available online (www.cambridge.org/9780521873710) | ||
650 | 4 | |a Wireless communication systems / Security measures | |
650 | 4 | |a Computer networks / Security measures | |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Funknetz |0 (DE-588)4216130-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Funknetz |0 (DE-588)4216130-7 |D s |
689 | 0 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Funknetz |0 (DE-588)4216130-7 |D s |
689 | 1 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
700 | 1 | |a Hubaux, Jean-Pierre |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-0-521-87371-0 |
856 | 4 | 0 | |u https://doi.org/10.1017/CBO9780511815102 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-20-CBO | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029351866 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1017/CBO9780511815102 |l BSB01 |p ZDB-20-CBO |q BSB_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9780511815102 |l FHN01 |p ZDB-20-CBO |q FHN_PDA_CBO |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176886288351232 |
---|---|
any_adam_object | |
author | Buttyán, Levente |
author_facet | Buttyán, Levente |
author_role | aut |
author_sort | Buttyán, Levente |
author_variant | l b lb |
building | Verbundindex |
bvnumber | BV043942896 |
collection | ZDB-20-CBO |
contents | pt. I: Introduction -- pt. II: Thwarting Malicious Behavior -- pt. III: Thwarting Selfish Behavior |
ctrlnum | (ZDB-20-CBO)CR9780511815102 (OCoLC)967685091 (DE-599)BVBBV043942896 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1017/CBO9780511815102 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03592nmm a2200565zc 4500</leader><controlfield tag="001">BV043942896</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161206s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780511815102</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-511-81510-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1017/CBO9780511815102</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-20-CBO)CR9780511815102</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)967685091</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043942896</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Buttyán, Levente</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and cooperation in wireless networks</subfield><subfield code="b">thwarting malicious and selfish behavior in the age of ubiquitous computing</subfield><subfield code="c">Levente Buttyan, Jean-Pierre Hubaux</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Security & Cooperation in Wireless Networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvii, 485 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from publisher's bibliographic system (viewed on 05 Oct 2015)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">pt. I: Introduction -- pt. II: Thwarting Malicious Behavior -- pt. III: Thwarting Selfish Behavior</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their implications explained in terms of security and cooperation, and potential malicious and selfish misdeeds are described along with the existing and future security techniques. Fundamental questions of security including user and device identification; establishment of security association; secure and cooperative routing in multi-hop networks; fair bandwidth distribution; and privacy protection are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor, and RFID networks. Important relationships between trust, security, and cooperation are also discussed. Contains homework problems and tutorials on cryptography and game theory. This text is suitable for advanced undergraduates and graduate students of electrical engineering and computer science, and researchers and practitioners in the wireless industry. Lecture slides and instructor-only solutions available online (www.cambridge.org/9780521873710)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hubaux, Jean-Pierre</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-0-521-87371-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1017/CBO9780511815102</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CBO</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029351866</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511815102</subfield><subfield code="l">BSB01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">BSB_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511815102</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">FHN_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043942896 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:39:18Z |
institution | BVB |
isbn | 9780511815102 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029351866 |
oclc_num | 967685091 |
open_access_boolean | |
owner | DE-12 DE-92 |
owner_facet | DE-12 DE-92 |
physical | 1 online resource (xvii, 485 pages) |
psigel | ZDB-20-CBO ZDB-20-CBO BSB_PDA_CBO ZDB-20-CBO FHN_PDA_CBO |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Buttyán, Levente Verfasser aut Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing Levente Buttyan, Jean-Pierre Hubaux Security & Cooperation in Wireless Networks Cambridge Cambridge University Press 2008 1 online resource (xvii, 485 pages) txt rdacontent c rdamedia cr rdacarrier Title from publisher's bibliographic system (viewed on 05 Oct 2015) pt. I: Introduction -- pt. II: Thwarting Malicious Behavior -- pt. III: Thwarting Selfish Behavior This is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their implications explained in terms of security and cooperation, and potential malicious and selfish misdeeds are described along with the existing and future security techniques. Fundamental questions of security including user and device identification; establishment of security association; secure and cooperative routing in multi-hop networks; fair bandwidth distribution; and privacy protection are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor, and RFID networks. Important relationships between trust, security, and cooperation are also discussed. Contains homework problems and tutorials on cryptography and game theory. This text is suitable for advanced undergraduates and graduate students of electrical engineering and computer science, and researchers and practitioners in the wireless industry. Lecture slides and instructor-only solutions available online (www.cambridge.org/9780521873710) Wireless communication systems / Security measures Computer networks / Security measures Sicherheit (DE-588)4054790-5 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Funknetz (DE-588)4216130-7 gnd rswk-swf Funknetz (DE-588)4216130-7 s Sicherheit (DE-588)4054790-5 s 1\p DE-604 Datensicherung (DE-588)4011144-1 s 2\p DE-604 Hubaux, Jean-Pierre Sonstige oth Erscheint auch als Druckausgabe 978-0-521-87371-0 https://doi.org/10.1017/CBO9780511815102 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Buttyán, Levente Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing pt. I: Introduction -- pt. II: Thwarting Malicious Behavior -- pt. III: Thwarting Selfish Behavior Wireless communication systems / Security measures Computer networks / Security measures Sicherheit (DE-588)4054790-5 gnd Datensicherung (DE-588)4011144-1 gnd Funknetz (DE-588)4216130-7 gnd |
subject_GND | (DE-588)4054790-5 (DE-588)4011144-1 (DE-588)4216130-7 |
title | Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing |
title_alt | Security & Cooperation in Wireless Networks |
title_auth | Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing |
title_exact_search | Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing |
title_full | Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing Levente Buttyan, Jean-Pierre Hubaux |
title_fullStr | Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing Levente Buttyan, Jean-Pierre Hubaux |
title_full_unstemmed | Security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing Levente Buttyan, Jean-Pierre Hubaux |
title_short | Security and cooperation in wireless networks |
title_sort | security and cooperation in wireless networks thwarting malicious and selfish behavior in the age of ubiquitous computing |
title_sub | thwarting malicious and selfish behavior in the age of ubiquitous computing |
topic | Wireless communication systems / Security measures Computer networks / Security measures Sicherheit (DE-588)4054790-5 gnd Datensicherung (DE-588)4011144-1 gnd Funknetz (DE-588)4216130-7 gnd |
topic_facet | Wireless communication systems / Security measures Computer networks / Security measures Sicherheit Datensicherung Funknetz |
url | https://doi.org/10.1017/CBO9780511815102 |
work_keys_str_mv | AT buttyanlevente securityandcooperationinwirelessnetworksthwartingmaliciousandselfishbehaviorintheageofubiquitouscomputing AT hubauxjeanpierre securityandcooperationinwirelessnetworksthwartingmaliciousandselfishbehaviorintheageofubiquitouscomputing AT buttyanlevente securitycooperationinwirelessnetworks AT hubauxjeanpierre securitycooperationinwirelessnetworks |