Published: 01/03/2009
ISBN: 9781905886906
Format: Paperback



Buy Printed Book

£39.99

Buy as a printed book
from our online shop
Author's discount
Discount Code:

There are 0 items in your basket | Checkout

Security and Privacy in Mobile and Wireless Networking
by Stefanos Gritzalis, Tom Karygiannis and Charalabos Skianis (editors)

Mobile and Wireless communication networks offer organizations and users several benefits, such as portability, mobility and flexibility, while increasing everyday business productivity, and reducing installation cost.

Wireless Local Area Networks, for instance, have been used in various environments, such as business, home, conference centres, airports and many more, allowing users to move from place to place, avoiding cabling restrictions and without being disconnected from the network.
Ad Hoc Networks are collections of wireless systems interconnected using multihop paths, without the help of any infrastructure such as base stations or access points; these networks allow data synchronization with network systems and application sharing between devices.

Mobile Ad Hoc Networks are autonomous collection of mobile entities that communicate over relatively bandwidth constrained wireless links, establishing survivable, efficient, dynamic communication for emergency operations.

Wireless Ad Hoc Sensor Networks consist of a number of sensors spread across a geographical area, offering certain capabilities and enhancements in operational efficiency in civilian applications, as well as assisting in international effort to increase alertness to potential threats.

However, although Mobile and Wireless Networking environments eliminate many of the problems associated with traditional wired networks, the new security and privacy risks introduced by such environments need to be reduced by exploiting appropriate security measures and safeguards, ensuring an acceptable level of overall residual hazard.

Contents include:
• Cryptographic Protocols for Mobile and Wireless Networks
• Key Management in Mobile and Wireless Computing
• Reasoning about Security and Privacy
• Privacy and Anonymity in Mobile and Wireless Computing
• Public Key Infrastructure in Mobile and Wireless Environments
• Economics of Security and Privacy in Wireless and Mobile environments
• Security Architectures and Protocols in WLANs and B3G/4G Mobile Networks
• Security and Privacy features into Mobile and Wearable devices
• Location Privacy
• Wireless Ad hoc and Sensor Networks Security
• Role of Sensors to Enable Security
• Security and Privacy in Pervasive Computing
• Trust Establishment, Negotiation, and Management
• Secure PHY/MAC/routing protocols
• Security under Resource Constraints (bandwidth, memory, energy, and computation constraints)

  • Author News
  • View Press Coverage
  • Read Book Reviews
  • Review This Book

No news has been uploaded for this title

No press coverage has been uploaded for this title

Be the first to review this book

 

Your Review

Your Name
Please enter your name.

To combat spam, please enter the text opposite into the box below:
Please enter the text:

 

Return to Book List