Handbook of research on wireless security

Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and...

Full description

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Zhang, Yan, 1962-, Zheng, Jun, Ph.D., Ma, Miao.
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2008.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 07582nam a2200637 a 4500
001 29588
003 IGIG
005 20100703174033.0
006 m e d
007 cr bn||||m|||a
008 100617s2008 paua fsb 001 0 eng d
010 # # |z 2007036301 
020 # # |a 9781599049007 (ebook) 
020 # # |a 1599049007 (ebook) 
020 # # |z 9781599048994 (hardcover) 
020 # # |z 159904899X (hardcover) 
024 7 # |a 10.4018/978-1-59904-899-4  |2 doi 
035 # # |a (CaBNVSL)gtp00541406 
035 # # |a (OCoLC)707610723 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a TK5102.85  |b .H35 2008e 
082 0 4 |a 005.8  |2 22 
245 0 0 |a Handbook of research on wireless security  |c Yan Zhang, Jun Zheng, Miao Ma [editors].  |h [electronic resource] / 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c c2008. 
300 # # |a electronic texts (860 p. : ill.) :  |b digital files. 
504 # # |a Includes bibliographical references and index. 
505 0 # |a Malicious Software in Mobile Devices / Thomas M. Chen, Cyrus Peikari -- Secure Service Discovery / Sheikh I. Ahamed ... [et al.] -- Security of Mobile Code / Zbigniew Kotulski, Aneta Zwierko -- Identity Management / Kumbesan Sandrasegaran, Mo Li -- Wireless Wardriving / Luca Caviglione -- Intrusion and Anomaly Detection in Wireless Networks / Amel Meddeb Makhlouf, Noureddine Boudriga -- Peer-to-Peer (P2P) Network Security: Firewall Issues / Lu Yan -- Identity Management for Wireless Service Access / Mohammad M.R. Chowdhury, Josef Noll -- Privacy Enhancing Techniques: A Survey and Classification / Peter Langendörfer ... [et al.] -- Vulnerability Analysis and Defenses in Wireless Networks / Lawan A. Mohammad, Biju Issac -- Key Distribution and Management for Mobile Applications / György Kálmán, Josef Noll -- Architecture and Protocols for Authentications, Authorization, and Accounting (AAA) in the Future Wireless Communications Networks / Said Zaghloul, Admela Jukan -- Authentication, Authorisation, and Access Control in Mobile Systems / Josef Noll, György Kálmán -- Trustworthy Networks, Authentication, Privacy, and Security Models / Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga -- The Provably Secure Formal Methods for Authentication and Key Agreement Protocols / Jianfeng Ma, Xinghua Li -- Multimedia Encryption and Watermarking in Wireless Environment / Shiguo Lian -- System-on-Chip Design of the Whirlpool Hash Function / Paris Kitsos -- 
505 0 # |a Security in 4G / Artur Hecker, Mohamad Badra -- Security Architectures for B3G Mobile Networks / Christoforos Ntantogian, Christos Xenakis -- Security in UMTS 3G Mobile Networks / Christos Xenakis -- Access Security in UMTS and IMS / Yan Zhang ... [et al.] -- Security in 2.5G Mobile Systems / Christos Xenakis -- End-to-End Security Comparisons Between IEEE 802.16e and 3G Technologies / Sasan Adibi, Gordon B. Agnew -- Generic Application Security in Current and Future Networks / Silke Holtmanns, Pekka Laitinen -- Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments / Sangheon Pack ... [et al.] -- Security in Mobile Ad Hoc Networks / Bin Lu -- Privacy and Anonymity in Mobile Ad Hoc Networks / Christer Andersson, Leonardo A. Martucci, Simone Fischer-Hübner -- Secure Routing with Reputation in MANET / Tomasz Ciszkowski, Zbigniew Kotulski -- Trust Management and Context-Driven Access Control / Paolo Bellavista ... [et al.] -- A Survey of Key Management in Mobile Ad Hoc Networks / Bing Wu, Jie Wu, Mihaela Cardei -- Security Measures for Mobile Ad-Hoc Networks (MANETs) / Sasan Adibi, Gordon B. Agnew -- A Novel Secure Video Surveillance System Over Wireless Ad-Hoc Networks / Hao Yin ... [et al.] -- Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks / John Felix Charles Joseph ... [et al.] -- Security in Wireless Sensor Networks / Luis E. Palafox, J. Antonio Garcia-Macias -- Security and Privacy in Wireless Sensor Networks: Challenges and Solutions / Mohamed Hamdi, Noreddine Boudriga -- 
505 0 # |a Routing Security in Wireless Sensor Networks / A.R. Naseer, Ismat K. Maarouf, Ashraf S. Hasan -- Localization Security in Wireless Sensor Networks / Yawen Wei, Zhen Yu, Yong Guan -- Resilience Against False Data Injection Attack in Wireless Sensor Networks / Miao Ma -- Survivability of Sensors with Key and Trust Management / Jean-Marc Seigneur, Luminita Moraru, Olivier Powell -- Fault Tolerant Topology Design for Ad Hoc and Sensor Networks / Yu Wang -- Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections / Georgios Kambourakis, Angelos Rouskas, Stefanos Gritzalis -- Bluetooth Devices Effect on Radiated EMS of Vehicle Wiring / Miguel A. Ruiz ... [et al.] -- Security in WLAN / Mohamad Badra, Artur Hecker -- Access Control in Wireless Local Area Networks: Fast Authentication Schemes / Jahan Hassan, Björn Landfeldt, Albert Y. Zomaya -- Security and Privacy in RFID Based Wireless Networks / Denis Trcek -- Security and Privacy Approaches for Wireless Local and Metropolitan Area Networks (LANs & MANS) / Giorgos Kostopoulos, Nicolas Sklavos, Odysseas Koufopavlou -- End-to-End (E2E) Security Approach in WiMAX: A Security Technical Overview for Corporate Multimedia Applications / Sasan Adibi, Gordon B. Agnew, Tom Tofigh -- Evaluation of Security Architectures for Mobile Broadband Access / Symeon Chatzinotas -- Extensible Authentication (EAP) Protocol Integrations in the Next Generation Cellular Networks / Sasan Adibi, Gordon B. Agnew. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to society. This handbook combines research from over 100 experts from 23 countries on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security. It is an innovative and current reference source for students, educators, faculty members, researchers, and engineers in the field of wireless security. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Title from PDF t.p. (viewed on June 16, 2010). 
650 # 0 |a Wireless communication systems  |x Security measures. 
653 # # |a Countermeasures 
653 # # |a Data security 
653 # # |a Future of wireless security 
653 # # |a Global security implications 
653 # # |a Identity and privacy confidentiality 
653 # # |a Information integrity 
653 # # |a Information privacy 
653 # # |a Intellectual property 
653 # # |a Mobile communication systems 
653 # # |a Monitoring systems 
653 # # |a Risk management 
653 # # |a Security and privacy requirements 
653 # # |a Tools, techniques, methods, and frameworks 
653 # # |a User management 
700 1 # |a Zhang, Yan,  |d 1962- 
700 1 # |a Zheng, Jun,  |c Ph.D. 
700 1 # |a Ma, Miao. 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC) 2007036301  |z 9781599048994  |z 159904899X 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-899-4  |z View fulltext via EzAccess