Security for wireless ad hoc networks
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, N.J.
Wiley-Interscience
©2007
|
Schlagworte: | |
Online-Zugang: | DE-1046 DE-1047 Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV043163149 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2007 xx o|||| 00||| eng d | ||
020 | |a 0470118466 |c electronic bk. |9 0-470-11846-6 | ||
020 | |a 0470118474 |9 0-470-11847-4 | ||
020 | |a 0471756881 |9 0-471-75688-1 | ||
020 | |a 9780470118467 |c electronic bk. |9 978-0-470-11846-7 | ||
020 | |a 9780470118474 |9 978-0-470-11847-4 | ||
020 | |a 9780471756880 |9 978-0-471-75688-0 | ||
035 | |a (OCoLC)86107727 | ||
035 | |a (DE-599)BVBBV043163149 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Anjum, Farooq |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security for wireless ad hoc networks |c Farooq Anjum and Petros Mouchtaris |
264 | 1 | |a Hoboken, N.J. |b Wiley-Interscience |c ©2007 | |
300 | |a 1 Online-Ressource (xv, 247 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references (pages 234-244) and index | ||
500 | |a Cover -- TOC36;Contents -- Preface -- Foreword -- Acknowledgments -- CH36;1 Introduction -- 146;1 Definition of Wireless Ad Hoc Networks -- 146;2 Applications of Wireless Ad Hoc Networks -- 146;3 Threats44; Attacks44; and Vulnerabilities -- 146;346;1 Threats -- 146;346;2 Vulnerabilities in Ad Hoc Networks -- 146;346;3 Attacks -- 146;4 Overview of the Book -- CH36;2 Basic Security Concepts -- 246;1 Introduction -- 246;2 Basic Concepts -- 246;246;1 Attributes -- 246;246;2 Cryptographic Primitives -- 246;3 Modes of Operation -- 246;4 Miscellaneous Properties -- 246;446;1 One45;Way Property of Hash Chains -- 246;446;2 TESLA -- 246;5 Summary -- CH36;3 Key Management -- 346;1 Introduction -- 346;2 Traditional Solution -- 346;3 Solutions for Ad Hoc Networks -- 346;346;1 Asymmetric Key45;Based Approach -- 346;346;2 Symmetric Key45;Based Approach -- 346;4 Summary -- CH36;4 Secure Routing -- 446;1 Introduction -- 446;146;1 Distance45;Vector and Link45;State Routing -- | ||
500 | |a - 446;146;2 Proactive vs Reactive Routing -- 446;2 Ad Hoc On45;Demand Distance Vector -- 446;246;1 Secure AODV -- 446;246;2 Authenticated Routing for Ad Hoc Networks 40;ARAN41; -- 446;246;3 Security45;Aware Ad Hoc Routing -- 446;3 Dynamic Source Routing Protocol -- 446;346;1 Secure Routing Protocol -- 446;346;2 Ariadne -- 446;346;3 EndairA58; A Provably Secure Routing Protocol -- 446;4 Destination45;Sequenced Distance45;Vector Routing Protocol -- 446;446;1 Secure Efficient Distance Vector Routing 40;SEAD41; -- 446;446;2 SuperSEAD -- 446;446;3 S45;DSDV -- 446;5 Optimized Link45;State Routing Protocol -- 446;546;1 Secure Extension to OLSR -- 446;546;2 Secure Link45;State Routing Protocol -- 446;6 Anonymous Routing Protocols -- 446;646;1 ANODR -- 446;646;2 MASK -- 446;7 Generic Attacks Against Routing -- 446;746;1 Wormhole Attacks -- 446;746;2 Rushing Attacks -- 446;746;3 Sybil Attacks -- 446;8 Summary -- CH36;5 Intrusion Detection Systems -- 546;1 Introduction -- | ||
500 | |a - 546;146;1 Traditional IDS Systems -- 546;2 Unique IDS Challenges in MANET -- 546;3 Threat Model -- 546;4 Architecture for Intrusion Detection in MANET -- 546;446;1 Noncollaborative Intrusion Detection System -- 546;446;2 Cooperative Intrusion Detection -- 546;446;3 Key Novel Concepts for Cooperative Intrusion Detection in MANET -- 546;5 Evidence Collection -- 546;546;1 Local Evidence -- 546;546;2 Promiscuous Monitoring -- 546;546;3 Evidence made Available by Other Nodes -- 546;6 Detection of Specific Attacks -- 546;646;1 Detection of Packet Dropping Attacks -- 546;646;2 Detection of Attacks Against Routing Protocols -- 546;7 Summary -- CH36;6 Policy Management -- 646;1 Introduction -- 646;2 Policy45;Based Network Management -- 646;246;1 Overview -- 646;246;2 Architecture -- 646;246;3 Policy Languages -- 646;246;4 Distributed Policy Management Architecture -- 646;246;5 IETF and DMTF Standardization Activities -- 646;3 Application of Policy Management to Security Management -- | ||
500 | |a - 646;346;1 Role45;Based Access Control 40;RBAC41; -- 646;346;2 Trust Management and the KeyNote System -- 646;346;3 Firewall Management -- 646;346;4 | ||
500 | |a This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments. An Instructor Support FTP site is available from the Wiley editorial board | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Wireless LANs / Security measures |2 fast | |
650 | 4 | |a Wireless LANs |x Security measures | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Ad-hoc-Netz |0 (DE-588)4674811-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Ad-hoc-Netz |0 (DE-588)4674811-8 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Mouchtaris, Petros |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=186646 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028587340 | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=186646 |l DE-1046 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=186646 |l DE-1047 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1819295537664360448 |
---|---|
any_adam_object | |
author | Anjum, Farooq |
author_facet | Anjum, Farooq |
author_role | aut |
author_sort | Anjum, Farooq |
author_variant | f a fa |
building | Verbundindex |
bvnumber | BV043163149 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)86107727 (DE-599)BVBBV043163149 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05963nam a2200613zc 4500</leader><controlfield tag="001">BV043163149</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2007 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470118466</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-11846-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470118474</subfield><subfield code="9">0-470-11847-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471756881</subfield><subfield code="9">0-471-75688-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470118467</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-11846-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470118474</subfield><subfield code="9">978-0-470-11847-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780471756880</subfield><subfield code="9">978-0-471-75688-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)86107727</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043163149</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Anjum, Farooq</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security for wireless ad hoc networks</subfield><subfield code="c">Farooq Anjum and Petros Mouchtaris</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">Wiley-Interscience</subfield><subfield code="c">©2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 247 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 234-244) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover -- TOC36;Contents -- Preface -- Foreword -- Acknowledgments -- CH36;1 Introduction -- 146;1 Definition of Wireless Ad Hoc Networks -- 146;2 Applications of Wireless Ad Hoc Networks -- 146;3 Threats44; Attacks44; and Vulnerabilities -- 146;346;1 Threats -- 146;346;2 Vulnerabilities in Ad Hoc Networks -- 146;346;3 Attacks -- 146;4 Overview of the Book -- CH36;2 Basic Security Concepts -- 246;1 Introduction -- 246;2 Basic Concepts -- 246;246;1 Attributes -- 246;246;2 Cryptographic Primitives -- 246;3 Modes of Operation -- 246;4 Miscellaneous Properties -- 246;446;1 One45;Way Property of Hash Chains -- 246;446;2 TESLA -- 246;5 Summary -- CH36;3 Key Management -- 346;1 Introduction -- 346;2 Traditional Solution -- 346;3 Solutions for Ad Hoc Networks -- 346;346;1 Asymmetric Key45;Based Approach -- 346;346;2 Symmetric Key45;Based Approach -- 346;4 Summary -- CH36;4 Secure Routing -- 446;1 Introduction -- 446;146;1 Distance45;Vector and Link45;State Routing -- </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - 446;146;2 Proactive vs Reactive Routing -- 446;2 Ad Hoc On45;Demand Distance Vector -- 446;246;1 Secure AODV -- 446;246;2 Authenticated Routing for Ad Hoc Networks 40;ARAN41; -- 446;246;3 Security45;Aware Ad Hoc Routing -- 446;3 Dynamic Source Routing Protocol -- 446;346;1 Secure Routing Protocol -- 446;346;2 Ariadne -- 446;346;3 EndairA58; A Provably Secure Routing Protocol -- 446;4 Destination45;Sequenced Distance45;Vector Routing Protocol -- 446;446;1 Secure Efficient Distance Vector Routing 40;SEAD41; -- 446;446;2 SuperSEAD -- 446;446;3 S45;DSDV -- 446;5 Optimized Link45;State Routing Protocol -- 446;546;1 Secure Extension to OLSR -- 446;546;2 Secure Link45;State Routing Protocol -- 446;6 Anonymous Routing Protocols -- 446;646;1 ANODR -- 446;646;2 MASK -- 446;7 Generic Attacks Against Routing -- 446;746;1 Wormhole Attacks -- 446;746;2 Rushing Attacks -- 446;746;3 Sybil Attacks -- 446;8 Summary -- CH36;5 Intrusion Detection Systems -- 546;1 Introduction -- </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - 546;146;1 Traditional IDS Systems -- 546;2 Unique IDS Challenges in MANET -- 546;3 Threat Model -- 546;4 Architecture for Intrusion Detection in MANET -- 546;446;1 Noncollaborative Intrusion Detection System -- 546;446;2 Cooperative Intrusion Detection -- 546;446;3 Key Novel Concepts for Cooperative Intrusion Detection in MANET -- 546;5 Evidence Collection -- 546;546;1 Local Evidence -- 546;546;2 Promiscuous Monitoring -- 546;546;3 Evidence made Available by Other Nodes -- 546;6 Detection of Specific Attacks -- 546;646;1 Detection of Packet Dropping Attacks -- 546;646;2 Detection of Attacks Against Routing Protocols -- 546;7 Summary -- CH36;6 Policy Management -- 646;1 Introduction -- 646;2 Policy45;Based Network Management -- 646;246;1 Overview -- 646;246;2 Architecture -- 646;246;3 Policy Languages -- 646;246;4 Distributed Policy Management Architecture -- 646;246;5 IETF and DMTF Standardization Activities -- 646;3 Application of Policy Management to Security Management -- </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - 646;346;1 Role45;Based Access Control 40;RBAC41; -- 646;346;2 Trust Management and the KeyNote System -- 646;346;3 Firewall Management -- 646;346;4</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments. An Instructor Support FTP site is available from the Wiley editorial board</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless LANs / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless LANs</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ad-hoc-Netz</subfield><subfield code="0">(DE-588)4674811-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Ad-hoc-Netz</subfield><subfield code="0">(DE-588)4674811-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mouchtaris, Petros</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=186646</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028587340</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=186646</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=186646</subfield><subfield code="l">DE-1047</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043163149 |
illustrated | Not Illustrated |
indexdate | 2024-12-24T04:43:47Z |
institution | BVB |
isbn | 0470118466 0470118474 0471756881 9780470118467 9780470118474 9780471756880 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028587340 |
oclc_num | 86107727 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xv, 247 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Wiley-Interscience |
record_format | marc |
spelling | Anjum, Farooq Verfasser aut Security for wireless ad hoc networks Farooq Anjum and Petros Mouchtaris Hoboken, N.J. Wiley-Interscience ©2007 1 Online-Ressource (xv, 247 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references (pages 234-244) and index Cover -- TOC36;Contents -- Preface -- Foreword -- Acknowledgments -- CH36;1 Introduction -- 146;1 Definition of Wireless Ad Hoc Networks -- 146;2 Applications of Wireless Ad Hoc Networks -- 146;3 Threats44; Attacks44; and Vulnerabilities -- 146;346;1 Threats -- 146;346;2 Vulnerabilities in Ad Hoc Networks -- 146;346;3 Attacks -- 146;4 Overview of the Book -- CH36;2 Basic Security Concepts -- 246;1 Introduction -- 246;2 Basic Concepts -- 246;246;1 Attributes -- 246;246;2 Cryptographic Primitives -- 246;3 Modes of Operation -- 246;4 Miscellaneous Properties -- 246;446;1 One45;Way Property of Hash Chains -- 246;446;2 TESLA -- 246;5 Summary -- CH36;3 Key Management -- 346;1 Introduction -- 346;2 Traditional Solution -- 346;3 Solutions for Ad Hoc Networks -- 346;346;1 Asymmetric Key45;Based Approach -- 346;346;2 Symmetric Key45;Based Approach -- 346;4 Summary -- CH36;4 Secure Routing -- 446;1 Introduction -- 446;146;1 Distance45;Vector and Link45;State Routing -- - 446;146;2 Proactive vs Reactive Routing -- 446;2 Ad Hoc On45;Demand Distance Vector -- 446;246;1 Secure AODV -- 446;246;2 Authenticated Routing for Ad Hoc Networks 40;ARAN41; -- 446;246;3 Security45;Aware Ad Hoc Routing -- 446;3 Dynamic Source Routing Protocol -- 446;346;1 Secure Routing Protocol -- 446;346;2 Ariadne -- 446;346;3 EndairA58; A Provably Secure Routing Protocol -- 446;4 Destination45;Sequenced Distance45;Vector Routing Protocol -- 446;446;1 Secure Efficient Distance Vector Routing 40;SEAD41; -- 446;446;2 SuperSEAD -- 446;446;3 S45;DSDV -- 446;5 Optimized Link45;State Routing Protocol -- 446;546;1 Secure Extension to OLSR -- 446;546;2 Secure Link45;State Routing Protocol -- 446;6 Anonymous Routing Protocols -- 446;646;1 ANODR -- 446;646;2 MASK -- 446;7 Generic Attacks Against Routing -- 446;746;1 Wormhole Attacks -- 446;746;2 Rushing Attacks -- 446;746;3 Sybil Attacks -- 446;8 Summary -- CH36;5 Intrusion Detection Systems -- 546;1 Introduction -- - 546;146;1 Traditional IDS Systems -- 546;2 Unique IDS Challenges in MANET -- 546;3 Threat Model -- 546;4 Architecture for Intrusion Detection in MANET -- 546;446;1 Noncollaborative Intrusion Detection System -- 546;446;2 Cooperative Intrusion Detection -- 546;446;3 Key Novel Concepts for Cooperative Intrusion Detection in MANET -- 546;5 Evidence Collection -- 546;546;1 Local Evidence -- 546;546;2 Promiscuous Monitoring -- 546;546;3 Evidence made Available by Other Nodes -- 546;6 Detection of Specific Attacks -- 546;646;1 Detection of Packet Dropping Attacks -- 546;646;2 Detection of Attacks Against Routing Protocols -- 546;7 Summary -- CH36;6 Policy Management -- 646;1 Introduction -- 646;2 Policy45;Based Network Management -- 646;246;1 Overview -- 646;246;2 Architecture -- 646;246;3 Policy Languages -- 646;246;4 Distributed Policy Management Architecture -- 646;246;5 IETF and DMTF Standardization Activities -- 646;3 Application of Policy Management to Security Management -- - 646;346;1 Role45;Based Access Control 40;RBAC41; -- 646;346;2 Trust Management and the KeyNote System -- 646;346;3 Firewall Management -- 646;346;4 This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments. An Instructor Support FTP site is available from the Wiley editorial board COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Wireless LANs / Security measures fast Wireless LANs Security measures Computersicherheit (DE-588)4274324-2 gnd rswk-swf Drahtloses lokales Netz (DE-588)4633975-9 gnd rswk-swf Ad-hoc-Netz (DE-588)4674811-8 gnd rswk-swf Drahtloses lokales Netz (DE-588)4633975-9 s Computersicherheit (DE-588)4274324-2 s Ad-hoc-Netz (DE-588)4674811-8 s 1\p DE-604 Mouchtaris, Petros Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=186646 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Anjum, Farooq Security for wireless ad hoc networks COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Wireless LANs / Security measures fast Wireless LANs Security measures Computersicherheit (DE-588)4274324-2 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd Ad-hoc-Netz (DE-588)4674811-8 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4633975-9 (DE-588)4674811-8 |
title | Security for wireless ad hoc networks |
title_auth | Security for wireless ad hoc networks |
title_exact_search | Security for wireless ad hoc networks |
title_full | Security for wireless ad hoc networks Farooq Anjum and Petros Mouchtaris |
title_fullStr | Security for wireless ad hoc networks Farooq Anjum and Petros Mouchtaris |
title_full_unstemmed | Security for wireless ad hoc networks Farooq Anjum and Petros Mouchtaris |
title_short | Security for wireless ad hoc networks |
title_sort | security for wireless ad hoc networks |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Wireless LANs / Security measures fast Wireless LANs Security measures Computersicherheit (DE-588)4274324-2 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd Ad-hoc-Netz (DE-588)4674811-8 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Wireless LANs / Security measures Wireless LANs Security measures Computersicherheit Drahtloses lokales Netz Ad-hoc-Netz |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=186646 |
work_keys_str_mv | AT anjumfarooq securityforwirelessadhocnetworks AT mouchtarispetros securityforwirelessadhocnetworks |