Skip to content
Open global navigation

Cambridge University Press

AcademicLocation selectorSearch toggleMain navigation toggle
Cart
Register Sign in Wishlist
Security and Cooperation in Wireless Networks

Security and Cooperation in Wireless Networks
Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing

$99.00

textbook
  • Date Published: November 2007
  • availability: In stock
  • format: Hardback
  • isbn: 9780521873710

$99.00
Hardback

Add to cart Add to wishlist

Other available formats:
eBook


Looking for an examination copy?

This title is not currently available for examination. However, if you are interested in the title for your course we can consider offering an examination copy. To register your interest please contact collegesales@cambridge.org providing details of the course you are teaching.

Description
Product filter button
Description
Contents
Resources
About the Authors
  • The current rate of deployment of wireless networks - whether cellular, LAN, Bluetooth, or sensor - is remarkable. Wireless systems are vulnerable to many kinds of attack, and the security features of fixed-line systems are not always applicable in the wireless arena. With ever-increasing amounts of data being carried on wireless networks, security has become a major concern and an area of great commercial importance. This book presents the key features of wireless networks and discusses various techniques for ensuring secure communication. In particular, techniques for dealing with hacking and other forms of attack will be dealt with, as will cooperation in multi-hop and ad hoc networks. It is suitable for senior undergraduates and graduate students of electrical engineering and computer science. Given the breadth of coverage, it will also appeal to researchers and practitioners in the wireless industry.

    • Covers techniques for protecting against hacking, and for cooperation in multi-hop and ad hoc networks
    • Covers the fundamental issues encompassing the full breadth of security in wireless networks
    • The tutorial nature of the book makes it more user-friendly
    Read more

    Reviews & endorsements

    "The authors offer both theoretical analysis and real-world examples...homework problems are provided at the end of each chapter, making the work suitable for classroom adoption."
    F.A. Cassara, Choice

    "Security and Cooperation in Wireless Networks achieves its goal of explaining how to prevent malicious and selfish behavior. It is a well written book that can serve as an inspiration for future research. Therefore, we can wholeheartedly recommend this book most of all for postgraduate students and lecturers, but also for researchers working in the field of wireless security.
    IEEE Communications Magazine, March 2009

    See more reviews

    Customer reviews

    Not yet reviewed

    Be the first to review

    Review was not posted due to profanity

    ×

    , create a review

    (If you're not , sign out)

    Please enter the right captcha value
    Please enter a star rating.
    Your review must be a minimum of 12 words.

    How do you rate this item?

    ×

    Product details

    • Date Published: November 2007
    • format: Hardback
    • isbn: 9780521873710
    • length: 496 pages
    • dimensions: 254 x 179 x 28 mm
    • weight: 1.136kg
    • contains: 140 b/w illus. 80 exercises
    • availability: In stock
  • Table of Contents

    Part I. Introduction:
    1. The security of existing wireless networks
    2. Upcoming wireless networks and new challenges
    3. Trust assumptions and adversary models
    Part II. Thwarting Malicious Behavior:
    4. Naming and addressing
    5. Establishment of security associations
    6. Securing neighbor discovery
    7. Secure routing in multi-hop wireless networks
    8. Privacy protection
    Part III. Thwarting Selfish Behavior:
    9. Selfish behavior at the MAC layer of CSMA/CA
    10. Selfishness in packet forwarding
    11. Wireless operators in a shared spectrum
    12. Secure protocols for behavior enforcement
    Appendices: A. Introduction to cryptographic algorithms and protocols
    B. A tutorial on game theory for wireless networks
    Bibliography
    Index.

  • general resources

    View all resources
    Group Section Name Type Size Sort Order filter vars
    General ResourcesSlideshow Files Linklinkn/aSort Order general resources general resources general resources general resources
    General ResourcesSolutionsSolutions Manualpdf313KB0solutions general resources solutions general resourcessolutions

    This title has a locked file and access is given only to instructors adopting the textbook for their class. We need to strictly enforce this so that solutions are not made available to students. To gain access to locked resources you need to first log in with your Cambridge account details and then return to this page to submit details of your course so you can be authenticated as an instructor. Click here to log in. If you do not have a Cambridge account you will first need to click here to create an account and then return to this page to be authenticated.


    These resources are provided free of charge by Cambridge University Press with permission of the author of the corresponding work, but are subject to copyright. You are permitted to view, print and download these resources for your own personal use only, provided any copyright lines on the resources are not removed or altered in any way. Any other use, including but not limited to distribution of the resources in modified form, or via electronic or other media, is strictly prohibited unless you have permission from the author of the corresponding work and provided you give appropriate acknowledgement of the source.

    If you are having problems accessing these resources please email cflack@cambridge.org

  • Authors

    Levente Buttyán, Technical University of Budapest

    Jean-Pierre Hubaux, École Polytechnique Fédérale de Lausanne

Sign In

Please sign in to access your account

Cancel

Not already registered? Create an account now. ×

You are now leaving the Cambridge University Press website, your eBook purchase and download will be completed by our partner www.ebooks.com. Please see the permission section of the www.ebooks.com catalogue page for details of the print & copy limits on our eBooks.

Continue ×

Continue ×

Find content that relates to you

© Cambridge University Press 2014

Back to top

Are you sure you want to delete your account?

This cannot be undone.

Cancel Delete

Thank you for your feedback which will help us improve our service.

If you requested a response, we will make sure to get back to you shortly.

×
Please fill in the required fields in your feedback submission.
×