買這商品的人也買了...
-
$780$616 -
$650$553 -
$490$417 -
$650$514 -
$480$408 -
$3,026$2,875 -
$650$507 -
$550$468 -
$1,881Advanced Wireless Communications: 4G Cognitive and Cooperative Broadband Technologies, 2/e
-
$980$774 -
$450$356 -
$580$493 -
$1,912Trusted Platform Module Basics: Using TPM in Embedded Systems
-
$590$466 -
$800$680 -
$5,010$4,760 -
$399Hacking Exposed Wireless
-
$1,240Developing Practical Wireless Applications (Paperback)
-
$850Wireless Networking Technology: From Principles to Successful Implementation
-
$5,530$5,254 -
$750$713 -
$780$702 -
$600$480 -
$880$695 -
$680$578
相關主題
商品描述
Description
This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments.
An Instructor Support FTP site is available from the Wiley editorial board.
Table of Contents
Preface.Foreword.
Acknowledgments.
1 Introduction.
1.1 Definition of Wireless Ad Hoc Networks.
1.2 Applications of Wireless Ad Hoc Networks.
1.3 Threats, Attacks, and Vulnerabilities.
1.3.1 Threats.
1.3.2 Vulnerabilities in Ad Hoc Networks.
1.3.3 Attacks.
1.4 Overview of the Book.
2 Basic Security Concepts.
2.1 Introduction.
2.2 Basic Concepts.
2.2.1 Attributes.
2.2.2 Cryptographic Primitives.
2.3 Modes of Operation.
2.4 Miscellaneous Properties.
2.4.1 One-Way Property of Hash Chains.
2.4.2 TESLA.
2.5 Summary.
3 Key Management.
3.1 Introduction.
3.2 Traditional Solution.
3.3 Solutions for Ad Hoc Networks.
3.3.1 Asymmetric Key-Based Approach.
3.3.2 Symmetric Key-Based Approach.
3.4 Summary.
4 Secure Routing.
4.1 Introduction.
4.1.1 Distance-Vector and Link-State Routing.
4.1.2 Proactive vs Reactive Routing.
4.2 Ad Hoc On-Demand Distance Vector.
4.2.1 Secure AODV.
4.2.2 Authenticated Routing for Ad Hoc Networks (ARAN).
4.2.3 Security-Aware Ad Hoc Routing.
4.3 Dynamic Source Routing Protocol.
4.3.1 Secure Routing Protocol.
4.3.2 Ariadne.
4.3.3 EndairA: A Provably Secure Routing Protocol.
4.4 Destination-Sequenced Distance-Vector Routing Protocol.
4.4.1 Secure Efficient Distance Vector Routing (SEAD).
4.4.2 SuperSEAD.
4.4.3 S-DSDV.
4.5 Optimized Link-State Routing Protocol.
4.5.1 Secure Extension to OLSR.
4.5.2 Secure Link-State Routing Protocol.
4.6 Anonymous Routing Protocols.
4.6.1 ANODR.
4.6.2 MASK.
4.7 Generic Attacks Against Routing.
4.7.1 Wormhole Attacks.
4.7.2 Rushing Attacks.
4.7.3 Sybil Attacks.
4.8 Summary.
5 Intrusion Detection Systems.
5.1 Introduction.
5.1.1 Traditional IDS Systems.
5.2 Unique IDS Challenges in MANET.
5.3 Threat Model.
5.4 Architecture for Intrusion Detection in MANET.
5.4.1 Noncollaborative Intrusion Detection System.
5.4.2 Cooperative Intrusion Detection.
5.4.3 Key Novel Concepts for Cooperative Intrusion Detection in MANET.
5.5 Evidence Collection.
5.5.1 Local Evidence.
5.5.2 Promiscuous Monitoring.
5.5.3 Evidence made Available by Other Nodes.
5.6 Detection of Specific Attacks.
5.6.1 Detection of Packet Dropping Attacks.
5.6.2 Detection of Attacks Against Routing Protocols.
5.7 Summary.
6 Policy Management.
6.1 Introduction.
6.2 Policy-Based Network Management.
6.2.1 Overview.
6.2.2 Architecture.
6.2.3 Policy Languages.
6.2.4 Distributed Policy Management Architecture.
6.2.5 IETF and DMTF Standardization Activities.
6.3 Application of Policy Management to Security Management.
6.3.1 Role-Based Access Control (RBAC).
6.3.2 Trust Management and the KeyNote System.
6.3.3 Firewall Management.
6.3.4 Policy Enforcement in a Wireless Ad Hoc Network.
6.4 Summary.
7 Secure Localization.
7.1 Introduction.
7.2 Localization.
7.2.1 Ranging.
7.2.2 Computation.
7.2.3 Attacks.
7.3 Secure Localization.
7.3.1 Distance Bounding Techniques.
7.3.2 Verifiable Multilateration.
7.3.3 Directional Antennae-Based Schemes.
7.3.4 Transmission Range Variation-Based Schemes.
7.3.5 Hybrid Schemes.
7.3.6 Malicious Beacons.
7.4 Summary.
8 Conclusions and Future Research.
8.1 Vehicular Networks.
8.1.1 Differences with MANET.
8.1.2 Open Problems and Solutions.
8.2 Summary.
Acronyms.
References.
Index.
商品描述(中文翻譯)
描述
本書探討了即時網路的安全問題並提供解決方案。主題包括威脅攻擊和漏洞、基本加密機制、身份驗證、安全路由、防火牆、安全策略管理以及未來發展。Wiley編輯委員會提供了一個教師支援FTP網站。
目錄
前言
序言
致謝
1. 簡介
1.1 無線即時網路的定義
1.2 無線即時網路的應用
1.3 威脅、攻擊和漏洞
1.3.1 威脅
1.3.2 無線即時網路的漏洞
1.3.3 攻擊
1.4 本書概述
2. 基本安全概念
2.1 簡介
2.2 基本概念
2.2.1 屬性
2.2.2 密碼學原理
2.3 操作模式
2.4 其他屬性
2.4.1 雜湊鏈的單向特性
2.4.2 TESLA
2.5 總結
3. 金鑰管理
3.1 簡介
3.2 傳統解決方案
3.3 無線即時網路的解決方案
3.3.1 非對稱金鑰方法
3.3.2 對稱金鑰方法
3.4 總結
4. 安全路由
4.1 簡介
4.1.1 距離向量和鏈路狀態路由
4.1.2 主動式與被動式路由
4.2 即時需求距離向量
4.2.1 安全的即時需求距離向量
4.2.2 無線即時網路的驗證路由
4.2.3 安全感知的無線即時網路路由
4.3 動態源路由協議
4.3.1 安全路由協議
4.3.2 Ariadne
4.3.3 EndairA:一個可證明安全的路由協議
4.4 目的地序列距離向量路由協議
4.4.1 安全高效的距離向量路由(SEAD)
4.4.2 SuperSEAD
4.4.3 S-DSDV
4.5 優化鏈路狀態路由協議
4.5.1 OLSR的安全擴展
4.5.2 安全鏈路狀態路由協議
4.6 匿名路由協議
4.6.1 ANODR
4.6.2 MASK
4.7 對路由的通用攻擊
4.7.1 蟲洞攻擊
4.7.2 突襲攻擊
4.7.3 Sybil攻擊
4.8 總結
5. 入侵檢測系統
5.1 簡介
5.1.1 傳統入侵檢測系統
5.2 無線即時網路中獨特的入侵檢測系統挑戰
5.3 威脅模型
5.4 無線即時網路中的入侵檢測架構
5.4.1 非協作式入侵檢測系統
5.4.2 協作式入侵檢測
5.4.3 無線即時網路中協作式入侵檢測的關鍵新概念
5.5 證據收集
5.5.1 本地證據
5.5.2 混雜監控
5.5.3 其他節點提供的證據
5.6 特定攻擊的檢測
5.6.1 封包丟棄攻擊的檢測
5.6.2 對路由協議的攻擊的檢測
5.7 總結
6. 策略管理
6.1 簡介
6.2 基於策略的網路管理
6.2.1 概述
6.2