Security in Wireless Mesh Networks

Regular price €167.40
Quantity:
Ships in 10-20 days
Delivery/Collection within 10-20 working days
Shipping & Delivery
ACL Entry
advanced mesh network security applications
authentication protocols
Block Cipher
Category=UTN
denial of service mitigation
dynamic self-organization
eq_bestseller
eq_computing
eq_isMigrated=1
eq_isMigrated=2
eq_nobargain
eq_non-fiction
IEEE wireless standards
key
Key Agreement Protocol
Mac Address
Mac Layer
malicious
Malicious Node
Mesh Network
Mesh Nodes
Mesh Routers
Misbehaving Nodes
mobile
Mobile Clients
Mobile Nodes
Multi-hop Communication
Multi-hop Wireless Networks
network intrusion detection
node
nodes
Pairwise Key
privacy protection methods
protocol
public
Route Error Message
routers
routing
Routing Protocols
RREP
RREQ
RREQ Message
Secure Routing Protocols
security surveillance system
self-configuration
sensor
Sensor Networks
Sensor Node
trust management systems
Wireless Mesh Networks
wireless mobile networks
WSN

Product details

  • ISBN 9780849382505
  • Weight: 952g
  • Dimensions: 156 x 234mm
  • Publication Date: 21 Aug 2008
  • Publisher: Taylor & Francis Ltd
  • Publication City/Country: GB
  • Product Form: Hardback
Secure checkout Fast Shipping Easy returns

Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. To achieve these aims, security mechanisms are essential to ensure trusted on-going communications.

Security in Wireless Mesh Networks explores key security challenges set in diverse scenarios, as well as emerging standards that include authentication, access control and authorization, attacks, privacy and trust, encryption, key management, identity management, DoS attacks, intrusion detection and prevention, secure routing, and security policies. The book also examines security mechanisms in IEEE 802.11, IEEE 802.15, IEEE 802.16, and IEEE 802.20 standards. In addition, it provides numerous case studies and applications to facilitate understanding.

As a single, comprehensive guide to security-related issues in WMN, this book is an important resource to have if you are working on the design, selection, and implementation of wireless mesh networks and system components.

Yan Zhang, Jun Zheng, Honglin Hu