Security in wireless mesh networks / edited by Yan Zhang, Jun Zheng, Honglin Hu.

Contributor(s): Zhang, Yan, 1977- | Zheng, Jun, Ph. D | Hu, Honglin, 1975-Material type: TextTextSeries: Wireless networks and mobile communications series: Publisher: Boca Raton, FL : CRC Press, c2009Description: ix, 536 p. : ill. ; 24 cmISBN: 9780849382505 (alk. paper); 0849382505 (alk. paper)Subject(s): Wireless communication systems -- Security measures | Computer networks -- Security measures | Routers (Computer networks)DDC classification: 005.8 LOC classification: TK5103.2 | .S44 2009Online resources: Table of contents only
Contents:
INTRODUCTION. An Introduction to Wireless Mesh Networks. Mesh Networking in Wireless PANs, LANs, MANs, and WANs. SECURITY PROTOCOLS AND TECHNIQUES. Attacks and Security Mechanisms. Intrusion Detection in Wireless Mesh Networks. Secure Routing in Wireless Mesh Networks. Hop Integrity in Wireless Mesh Networks. Privacy Preservation in Wireless Mesh Networks. Providing Authentication, Trust, and Privacy in Wireless Mesh Networks. Non-Interactive Key Establishment in Wireless Mesh Networks. Key Management in Wireless Mesh Networks. SECURITY STANDARDS, APPLICATIONS, AND ENABLING TECHNOLOGIES. Security in Wireless PAN Mesh Networks. Security in Wireless LAN Mesh Networks. Security in IEEE 802.15.4 Cluster-Based Networks. Security in Wireless Sensor Networks. Key Management in Wireless Sensor Networks. Index.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current library Call number Copy number Status Notes Date due Barcode
Books Books Female Library
TK5103.2 .S44 2009 (Browse shelf (Opens below)) 1 Available STACKS 51952000075738
Books Books Main Library
TK5103.2 .S44 2009 (Browse shelf (Opens below)) 1 Available STACKS 51952000053569

"An Auerbach book."

Includes bibliographical references and index.

INTRODUCTION. An Introduction to Wireless Mesh Networks. Mesh Networking in Wireless PANs, LANs, MANs, and WANs. SECURITY PROTOCOLS AND TECHNIQUES. Attacks and Security Mechanisms. Intrusion Detection in Wireless Mesh Networks. Secure Routing in Wireless Mesh Networks. Hop Integrity in Wireless Mesh Networks. Privacy Preservation in Wireless Mesh Networks. Providing Authentication, Trust, and Privacy in Wireless Mesh Networks. Non-Interactive Key Establishment in Wireless Mesh Networks. Key Management in Wireless Mesh Networks. SECURITY STANDARDS, APPLICATIONS, AND ENABLING TECHNOLOGIES. Security in Wireless PAN Mesh Networks. Security in Wireless LAN Mesh Networks. Security in IEEE 802.15.4 Cluster-Based Networks. Security in Wireless Sensor Networks. Key Management in Wireless Sensor Networks. Index.

1 2

There are no comments on this title.

to post a comment.