Skip to content

Your Cart


You have 0 items in your cart.

Register Sign in Wishlist
Security and Cooperation in Wireless Networks

Security and Cooperation in Wireless Networks
Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing

$108.00 (P)

  • Date Published: November 2007
  • availability: In stock
  • format: Hardback
  • isbn: 9780521873710

$ 108.00 (P)

Add to cart Add to wishlist

Other available formats:

Looking for an examination copy?

If you are interested in the title for your course we can consider offering an examination copy. To register your interest please contact providing details of the course you are teaching.

Product filter button
About the Authors
  • The current rate of deployment of wireless networks - whether cellular, LAN, Bluetooth, or sensor - is remarkable. Wireless systems are vulnerable to many kinds of attack, and the security features of fixed-line systems are not always applicable in the wireless arena. With ever-increasing amounts of data being carried on wireless networks, security has become a major concern and an area of great commercial importance. This book presents the key features of wireless networks and discusses various techniques for ensuring secure communication. In particular, techniques for dealing with hacking and other forms of attack will be dealt with, as will cooperation in multi-hop and ad hoc networks. It is suitable for senior undergraduates and graduate students of electrical engineering and computer science. Given the breadth of coverage, it will also appeal to researchers and practitioners in the wireless industry.

    • Covers techniques for protecting against hacking, and for cooperation in multi-hop and ad hoc networks
    • Covers the fundamental issues encompassing the full breadth of security in wireless networks
    • The tutorial nature of the book makes it more user-friendly
    Read more

    Reviews & endorsements

    "The authors offer both theoretical analysis and real-world examples...homework problems are provided at the end of each chapter, making the work suitable for classroom adoption."
    F.A. Cassara, Choice

    "Security and Cooperation in Wireless Networks achieves its goal of explaining how to prevent malicious and selfish behavior. It is a well written book that can serve as an inspiration for future research. Therefore, we can wholeheartedly recommend this book most of all for postgraduate students and lecturers, but also for researchers working in the field of wireless security.
    IEEE Communications Magazine, March 2009

    See more reviews

    Customer reviews

    Not yet reviewed

    Be the first to review

    Review was not posted due to profanity


    , create a review

    (If you're not , sign out)

    Please enter the right captcha value
    Please enter a star rating.
    Your review must be a minimum of 12 words.

    How do you rate this item?


    Product details

    • Date Published: November 2007
    • format: Hardback
    • isbn: 9780521873710
    • length: 496 pages
    • dimensions: 254 x 179 x 28 mm
    • weight: 1.13kg
    • contains: 140 b/w illus. 80 exercises
    • availability: In stock
  • Table of Contents

    Part I. Introduction:
    1. The security of existing wireless networks
    2. Upcoming wireless networks and new challenges
    3. Trust assumptions and adversary models
    Part II. Thwarting Malicious Behavior:
    4. Naming and addressing
    5. Establishment of security associations
    6. Securing neighbor discovery
    7. Secure routing in multi-hop wireless networks
    8. Privacy protection
    Part III. Thwarting Selfish Behavior:
    9. Selfish behavior at the MAC layer of CSMA/CA
    10. Selfishness in packet forwarding
    11. Wireless operators in a shared spectrum
    12. Secure protocols for behavior enforcement
    Appendices: A. Introduction to cryptographic algorithms and protocols
    B. A tutorial on game theory for wireless networks

  • Resources for

    Security and Cooperation in Wireless Networks

    Levente Buttyán, Jean-Pierre Hubaux

    General Resources

    Welcome to the resources site

    Here you will find free-of-charge online materials to accompany this book. The range of materials we provide across our academic and higher education titles are an integral part of the book package whether you are a student, instructor, researcher or professional.

    Find resources associated with this title

    Type Name Unlocked * Format Size

    Showing of

    Back to top

    *This title has one or more locked files and access is given only to instructors adopting the textbook for their class. We need to enforce this strictly so that solutions are not made available to students. To gain access to locked resources you either need first to sign in or register for an account.

    These resources are provided free of charge by Cambridge University Press with permission of the author of the corresponding work, but are subject to copyright. You are permitted to view, print and download these resources for your own personal use only, provided any copyright lines on the resources are not removed or altered in any way. Any other use, including but not limited to distribution of the resources in modified form, or via electronic or other media, is strictly prohibited unless you have permission from the author of the corresponding work and provided you give appropriate acknowledgement of the source.

    If you are having problems accessing these resources please email

  • Instructors have used or reviewed this title for the following courses

    • Adv. Topics in Information Security: Wireless Network Security
    • Computer and Network Security
    • Embedded Wireless Protocol Lab Design
    • Incident Response Technologies
    • Mobile Communications and Wireless Security
    • Secure computing practices
    • Security in Wireless Networks: A physical layer approach
    • Wireless Sensor Networks
  • Authors

    Levente Buttyán, Technical University of Budapest
    Levente Buttyán is an Associate Professor at the Department of Telecommunications, Budapest University of Technology and Economics (BME), Hungary.

    Jean-Pierre Hubaux, École Polytechnique Fédérale de Lausanne
    Jean-Pierre Hubaux is a Professor at the School of Computer and Communication Sciences, Ecole Polytechnique Fédérale de Lausanne (EPFL), Switzerland.

Sign In

Please sign in to access your account


Not already registered? Create an account now. ×

Sorry, this resource is locked

Please register or sign in to request access. If you are having problems accessing these resources please email

Register Sign in
Please note that this file is password protected. You will be asked to input your password on the next screen.

» Proceed

You are now leaving the Cambridge University Press website. Your eBook purchase and download will be completed by our partner Please see the permission section of the catalogue page for details of the print & copy limits on our eBooks.

Continue ×

Continue ×

Continue ×

Find content that relates to you

Are you sure you want to delete your account?

This cannot be undone.


Thank you for your feedback which will help us improve our service.

If you requested a response, we will make sure to get back to you shortly.

Please fill in the required fields in your feedback submission.