Security And Routing Issues In Wireless Networks

Download Security And Routing Issues In Wireless Networks PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Security And Routing Issues In Wireless Networks book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.
Wireless Networks and Security

Author: Shafiullah Khan
language: en
Publisher: Springer Science & Business Media
Release Date: 2013-01-26
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications. The contributions identify various vulnerabilities in the physical layer, MAC layer, network layer, transport layer, and application layer, and focus on ways of strengthening security mechanisms and services throughout the layers. This carefully edited monograph is targeting for researchers, post-graduate students in universities, academics, and industry practitioners or professionals.
Security and Routing Issues in Wireless Networks

Wireless networks have been widely used in industries, military and education. We usually represent a wireless network as a Unit Disk Graph (UDG) G = ( V, E ) . There are many issues considered in wireless networks. In this dissertation, I mainly focused on the security and routing issues which are two of the most important issues in wireless networks. Security is one of the important issues in wireless networks. Secure clustering problem plays an important role in distributed sensor networks. Weakly Connected Dominating Set (WCDS) is used for solving this problem. Therefore, computing a minimum WCDS becomes an important topic of this research. I compared the size of Maximal Independent Set (MIS) and minimum WCDS in unit disk graph. The analysis showed that five is the least upper bound for this ratio. I also presented a distributed algorithm to produce a weakly connected MIS within a factor 5 from the minimum WCDS. DENIAL-OF-SERVICE (DoS) attack, which aims to make a service unavailable to legitimate clients, is another threat to the internet security. I made a connection between group testing and internet security. Group testing is a technique to detect the defective items with minimum number of tests. It tests the items by group instead of one by one to save the testing times. I used group testing technique to test which server or application is being attacked. Group testing is a technique to detect the defective items with minimum number of tests. It tests the items by group instead of one by one to save the testing times. Routing is another most important issues in wireless networks. A good routing path can save much energy. Energy consumption is always a big concern in wireless networks. Connected Dominating Set (CDS) is a popular way to construct the virtual backbone in wireless network. I showed that a minimum nonsubmodular cover problem could be reduced into a problem of minimum submodular cover with submodular cost. And I approached to the solution of MOC-CDS problem by showing a little weaker result using Generalized Hitting Set.
Wireless Network Security

Author: Yang Xiao
language: en
Publisher: Springer Science & Business Media
Release Date: 2007-12-29
This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.