-
Security in Wireless Ad Hoc and Sensor Networks.pdf下载
资源介绍
Contents
AbouttheAuthors
xiii
Preface
xv
Acknowledgements
xvii
ListofAcronyms
xix
PartOne
WirelessAdHoc,SensorandMeshNetworking
1
1Introduction
3
1.1
InformationSecurity
4
1.1.1
ComputerSecurity
4
1.1.2
CommunicationsSecurity
5
1.2
ScopeoftheBook
5
1.3
StructureoftheBook
6
1.4
ElectronicResourcesfortheBook
7
1.5
ReviewQuestions
7
2WirelessAdHoc,SensorandMeshNetworks
9
2.1
AdHocNetworksandApplications
10
2.1.1
ApplicationExamples
10
2.1.2
Challenges
11
2.2
SensorandActuatorNetworks
13
2.2.1
ApplicationExamples
14
2.2.2
Challenges
15
2.3
MeshNetworks
17
2.3.1
ApplicationExamples
18
2.3.2
Challenges
19
2.4
TacticalCommunicationsandNetworks
19
2.4.1
BlueForceTrackingSystem
22
2.5
FactorsInfluencingtheDesignofWirelessAdHoc,SensorandMesh
Networks
23
2.5.1
WirelessMedium
24
2.5.2
NetworkingRegime
25
viii
Contents
2.5.3
NatureofTraffic
26
2.5.4
QualityofServiceRequirements
26
2.5.5
Mobility
26
2.5.6
FaultTolerance
27
2.5.7
OperatingEnvironment
27
2.5.8
PowerEfficiencyRequirements
27
2.5.9
Scalability
27
2.5.10
HardwareRequirementsandProductionCost
27
2.6
ReviewQuestions
28
3TheWirelessMedium
29
3.1
WirelessChannelFundamentalsandSecurity
29
3.1.1
Capacity
31
3.1.2
ElectromagneticSpectrum
32
3.1.3
PathLossandAttenuation
35
3.1.4
OtherTransmissionImpairmentsandJamming
36
3.1.5
ModulationandDemodulation
38
3.1.6
ManchesterEncoding
41
3.1.7
MultiplexingandDuplexing
42
3.2
AdvancedRadioTechnologies
43
3.2.1
DirectionalandSmartAntennas
43
3.2.2
SoftwareRadios
44
3.2.3
CognitiveRadios
44
3.2.4
Multiradio/MultichannelSystems
45
3.2.5
MIMOSystems
45
3.3
ReviewQuestions
45
4MediumAccessandErrorControl
47
4.1
MediumAccessControl
47
4.1.1
GenericMACProtocols
47
4.1.2
MACProtocolsforWirelessAdHoc,SensorandMesh
Networks
51
4.2
ErrorControl
53
4.2.1
ErrorCorrection
54
4.2.2
ErrorDetection
56
4.3
WirelessMetropolitanAreaNetworks
58
4.3.1
IEEE802.16
58
4.3.2
WiMAX
58
4.4
WirelessLocalAreaNetworks
59
4.4.1
IEEE802.11
59
4.4.2
Wi-Fi
60
4.5
WirelessPersonalAreaNetworks
60
4.5.1
IEEE802.15.1
60
4.5.2
Bluetooth
61
4.5.3
IEEE802.15.4
62
Contents
ix
4.5.4
ZigBee
62
4.5.5
WiMedia
63
4.6
ReviewQuestions
64
5Routing
65
5.1
InternetProtocolandMobileIP
65
5.1.1
IPv4,IPv6andSecurityinIP
65
5.1.2
DistanceVectorandLinkStateAlgorithms
68
5.1.3
Internetworking
70
5.1.4
Multicasting,Geocasting,Anycastingand
Broadcasting
71
5.1.5
MobileIP
71
5.2
RoutinginWirelessAdHocNetworks
72
5.2.1
FloodingandGossiping
73
5.2.2
AdHocOn-demandDistanceVectorRouting(AODV)
73
5.2.3
DynamicSourceRouting
74
5.3
RoutinginWirelessSensorandActuatorNetworks
75
5.3.1
DirectedDiffusion
75
5.3.2
SensorProtocolsforInformationviaNegotiation
(SPIN)
76
5.3.3
Low-EnergyAdaptiveClusteringHierarchy
(LEACH)
76
5.3.4
Power-AwareMany-to-ManyRouting(PAMR)
77
5.4
ReviewQuestions
79
6Reliability,FlowandCongestionControl
81
6.1
Reliability
81
6.1.1
Non-Acknowledgement-BasedSchemes
83
6.1.2
Acknowledgement-BasedSchemes
84
6.2
FlowandCongestionControl
85
6.3
ReviewQuestions
88
7OtherChallengesandSecurityAspects
89
7.1
LocalizationandPositioning
89
7.2
TimeSynchronization
93
7.3
Addressing
95
7.4
DataAggregationandFusion
96
7.5
DataQuerying
97
7.5.1
DatabaseApproach
97
7.5.2
TaskSets
99
7.5.3
OtherData-QueryingSchemes
99
7.6
Coverage
100
7.7
MobilityManagement
101
7.8
Cross-layerDesign
102
7.9
ReviewQuestions
103
x
Contents
PartTwo
SecurityinWirelessAdHoc,SensorandMeshNetworking
105
8SecurityAttacksinAdHoc,SensorandMeshNetworks
107
8.1
SecurityAttacks
107
8.1.1
PassiveAttacks
107
8.1.2
ActiveAttacks
109
8.2
Attackers
117
8.3
SecurityGoals
119
8.4
ReviewQuestions
119
9Cryptography
121
9.1
SymmetricEncryption
121
9.2
AsymmetricEncryption
127
9.3
HashFunctionsandMessageAuthenticationCode
131
9.4
CascadingHashing
136
9.4.1
HashChains
137
9.4.2
HashTrees
137
9.4.3
TESLA
138
9.5
ReviewQuestions
140
10ChallengesandSolutions:BasicIssues
143
10.1BootstrappingSecurityinAdHocNetworks
144
10.2BootstrappingSecurityinSensorNetworks
145
10.3KeyDistribution,ExchangeandManagement
146
10.3.1
Standards
147
10.3.2
ClassificationofKeyManagementSchemes
147
10.3.3
ContributorySchemes
148
10.3.4
DistributiveSchemes
153
10.4AuthenticationIssues
171
10.5Integrity
171
10.6ReviewQuestions
172
11ChallengesandSolutions:Protection
173
11.1PrivacyandAnonymity
173
11.2IntrusionDetection
174
11.2.1
ArchitecturesforIDSinWirelessAdHocNetworks
175
11.3DefenseAgainstTrafficAnalysis
177
11.4AccessControlandSecureHuman–ComputerInteraction
177
11.5Software-BasedAnti-TamperTechniques
179
11.5.1
EncryptionWrappers
180
11.5.2
CodeObfuscation
181
11.5.3
SoftwareWatermarkingandFingerprinting
181
11.5.4
Guarding
182
11.6TamperResilience:HardwareProtection
183
11.7AvailabilityandPlausibility
184
11.8ReviewQuestions
185
Contents
xi
12SecureRouting
187
12.1DefenseAgainstSecurityAttacksinAdHocRouting
187
12.1.1
TechniquesAgainstWormholeAttacks
188
12.1.2
TechniquesAgainstSybilAttacks
189
12.1.3
TechniquesAgainstSelectiveForwarding
189
12.1.4
SecureRoutinginSensorNetworks
190
12.1.5
RoutingSchemesThatEnhanceSecurity
191
12.2SecureAdHocRoutingProtocols
192
12.2.1
Intrusion-TolerantRoutinginWirelessSensorNetworks
(INSENS)
193
12.2.2
AuthenticatedRoutingforAdHocNetworking(ARAN)
195
12.2.3
On-DemandSecureAdHocRouting(ARIADNE)
197
12.2.4
WatchdogPathrater
199
12.2.5
SecureAdHocOn-DemandDistanceVector(SAODV)
199
12.2.6
SecureLinkStateRoutingProtocol(SLSP)
200
12.3FurtherReading
201
12.4ReviewQuestions
202
13SpecificChallengesandSolutions
203
13.1SPINS:SecurityProtocolsforSensorNetworks
203
13.1.1
SNEP
204
13.1.2
μTESLA
205
13.2QuarantineRegionSchemeforSpamAttacks
205
13.3SecureChargingandRewardingScheme
209
13.3.1
EstablishingaSession
210
13.3.2
PacketDelivery
211
13.3.3
AcknowledgingDelivery
212
13.3.4
TerminatingaSession
212
13.4SecureNodeLocalization
213
13.4.1
DetectionofMaliciousBeaconNodesandReplayedBeacon
Signals
213
13.4.2
Attack-ResistantLocationEstimation
215
13.5SecureTimeSynchronization
216
13.6SecureEventandEventBoundaryDetection
217
13.6.1
Stage1:DetectionofFaultyNodes
217
13.6.2
Stage2:DetectionofEventBoundaryNodes
219
13.6.3
Stage3:ImprovementofEventBoundaryNode
Detection
220
13.7ReviewQuestions
220
14InformationOperationsandElectronicWarfare
221
14.1ElectronicSupport
223
14.2ElectronicAttack
224
14.3ElectronicProtection
225
14.4ReviewQuestions
225
xii
Contents
15Standards
227
15.1X.800andRFC2828
227
15.1.1
SecurityThreatsandAttacks
227
15.1.2
SecurityServices
228
15.1.3
SecurityMechanisms
230
15.1.4
RelationshipsbetweenSecurityServicesandMechanisms
231
15.1.5
PlacementsofSecurityServicesandMechanisms
231
15.2WiredEquivalentPrivacy(WEP)
231
15.2.1
HowDoesWEPWork?
231
15.2.2
WEPWeaknesses
236
15.3Wi-FiProtectedAccess(WPA)
239
15.3.1
HowDoesWPAWork?
239
15.3.2
WEPandWPAComparison
242
15.3.3
WPA2
242
References
245
Index
- 上一篇: 串口和蓝牙通信程序
- 下一篇: 51单片机与蓝牙模块的串口通信C程序