Book description
Presenting cutting-edge research, this book explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it provides readers with the understanding required to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks. This edited volume includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems.
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents
- Preface
- About the Editors
- Contributors
- Chapter 1: Introduction (1/9)
- Chapter 1: Introduction (2/9)
- Chapter 1: Introduction (3/9)
- Chapter 1: Introduction (4/9)
- Chapter 1: Introduction (5/9)
- Chapter 1: Introduction (6/9)
- Chapter 1: Introduction (7/9)
- Chapter 1: Introduction (8/9)
- Chapter 1: Introduction (9/9)
- Chapter 2: Architecture and Organization Issues (1/6)
- Chapter 2: Architecture and Organization Issues (2/6)
- Chapter 2: Architecture and Organization Issues (3/6)
- Chapter 2: Architecture and Organization Issues (4/6)
- Chapter 2: Architecture and Organization Issues (5/6)
- Chapter 2: Architecture and Organization Issues (6/6)
- Chapter 3: Routing for Ad-Hoc Networks (1/5)
- Chapter 3: Routing for Ad-Hoc Networks (2/5)
- Chapter 3: Routing for Ad-Hoc Networks (3/5)
- Chapter 3: Routing for Ad-Hoc Networks (4/5)
- Chapter 3: Routing for Ad-Hoc Networks (5/5)
- Chapter 4: Different Types of Attacks for WANs (1/4)
- Chapter 4: Different Types of Attacks for WANs (2/4)
- Chapter 4: Different Types of Attacks for WANs (3/4)
- Chapter 4: Different Types of Attacks for WANs (4/4)
- Chapter 5: Honesty and Trust-Based IDS Solutions (1/8)
- Chapter 5: Honesty and Trust-Based IDS Solutions (2/8)
- Chapter 5: Honesty and Trust-Based IDS Solutions (3/8)
- Chapter 5: Honesty and Trust-Based IDS Solutions (4/8)
- Chapter 5: Honesty and Trust-Based IDS Solutions (5/8)
- Chapter 5: Honesty and Trust-Based IDS Solutions (6/8)
- Chapter 5: Honesty and Trust-Based IDS Solutions (7/8)
- Chapter 5: Honesty and Trust-Based IDS Solutions (8/8)
- Chapter 6: Blackhole Attack Detection Technique (1/5)
- Chapter 6: Blackhole Attack Detection Technique (2/5)
- Chapter 6: Blackhole Attack Detection Technique (3/5)
- Chapter 6: Blackhole Attack Detection Technique (4/5)
- Chapter 6: Blackhole Attack Detection Technique (5/5)
- Chapter 7: Intrusion Detection for Wireless Mesh Networks (1/6)
- Chapter 7: Intrusion Detection for Wireless Mesh Networks (2/6)
- Chapter 7: Intrusion Detection for Wireless Mesh Networks (3/6)
- Chapter 7: Intrusion Detection for Wireless Mesh Networks (4/6)
- Chapter 7: Intrusion Detection for Wireless Mesh Networks (5/6)
- Chapter 7: Intrusion Detection for Wireless Mesh Networks (6/6)
- Chapter 8: Future Trends in WAN Security (1/6)
- Chapter 8: Future Trends in WAN Security (2/6)
- Chapter 8: Future Trends in WAN Security (3/6)
- Chapter 8: Future Trends in WAN Security (4/6)
- Chapter 8: Future Trends in WAN Security (5/6)
- Chapter 8: Future Trends in WAN Security (6/6)
- Back Cover
Product information
- Title: Intrusion Detection in Wireless Ad-Hoc Networks
- Author(s):
- Release date: February 2014
- Publisher(s): CRC Press
- ISBN: 9781466515673
You might also like
book
Security in Wireless Ad Hoc and Sensor Networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks Security …
book
Wireless Ad Hoc and Sensor Networks
Although wireless sensor networks (WSNs) have been employed across a range of applications, there are few …
book
Computer Forensics InfoSec Pro Guide
Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of …
book
Ad Hoc Mobile Wireless Networks, 2nd Edition
Now in its second edition, this volume explains the concepts, mechanism, design, and performance of ad …