《新一代信息科学与技术丛书·无线网络安全:理论与应用》[77M]百度网盘|pdf下载|亲测有效
《新一代信息科学与技术丛书·无线网络安全:理论与应用》[77M]百度网盘|pdf下载|亲测有效

新一代信息科学与技术丛书·无线网络安全:理论与应用 pdf下载

出版社 高等教育出版社京东自营官方旗舰店
出版年 2013-05
页数 390页
装帧 精装
评分 9.4(豆瓣)
8.99¥ 10.99¥

内容简介

本篇主要提供新一代信息科学与技术丛书·无线网络安全:理论与应用电子书的pdf版本下载,本电子书下载方式为百度网盘方式,点击以上按钮下单完成后即会通过邮件和网页的方式发货,有问题请联系邮箱ebook666@outlook.com

内容简介

  《新一代信息科学与技术丛书·无线网络安全:理论与应用(英文版)》全书内容包含了经典及最新的无线网络安全的算法、机理和技术,讨论了无线网络的安全问题,如WLAN、蓝牙、卫星、MANET、传感器网络等。全书既包含理论讲述,也注重实践技术应用,同时反8央了无线网络安全领域的新进展。
  《新一代信息科学与技术丛书·无线网络安全:理论与应用(英文版)》可供信息安全等学科从事研究及应用的科研人员使用,也可供高年级本科生及研究生在学习相关课程时参考使用。

内页插图

目录

Chapter 1 Applications, Technologies, and Standards in Secure Wireless Networks and Communications
Lei Chen
1.1 Introduction
1.2 Overview of Security in Cellular Networks and Communications
1.3 Overview of Security in WLANs
1.4 Overview of Security in WMANs
1.5 Overview of Security in Bluetooth Networks and Communications
1.6 Overview of Security in VANETs
1.7 Overview of Security in WSNs
1.8 Overview of Security in WMNs
1.9 Overview of Security in RFID Networks and Communications
1.10 Summary
References

Chapter 2 Security in Cellular Networks and Communications
Chuan-Kun, Wu
2.1 Introduction
2.2 Security architecture of cellular communication networks
2.3 Security techniques in GSM networks
2.4 Security techniques in 3G networks
2.5 Security techniques in LTE networks
2.6 Security issues in femtocell
2.7 Privacy issues in cellular networks
2.8 Security issues of mobile devices
2.9 Concluding remarks
References

Chapter 3 Security in Wireless Local Area Networks Chao Yang and Guofei Gu
3.1 Introduction to WLAN
3.2 Current State of WLAN Security
3.3 WLAN Communication Security
3.4 WLAN Access Point Security
3.5 Other WLAN Security Issues
3.6 Conclusion
References

Chapter 4 Security in Wireless Metropolitan Area Networks
Lei Chen, Natrasi,mha Shashidhar, Shen,gli Yuan, and Ming Yang
4.1 Introduction
4.2 Fundamentals of WiMAX
4.3 WiMAX security goals and solutions
4.4 WiMAX security vulnerabilities, threats, and countermeasures
4.5 Summary
References

Chapter 5 Security in Bluetooth Networks and Communications
Lei Chen, Peter Cooper, and Qingzhong Liu
5.1 Introduction
5.2 Bluetooth Primer
5.3 Bluetooth Security Solutions
5.4 Bluetooth Security Vulnerabilities, Threats, and Countermeasures
5.5 Conclusion
References

Chapter 6 Security in Vehicular Ad Hoc Networks(VANETs)
Weidong Yang
6.1 Introduction
……

Chapter 7 Security in Wireless Sensor Networks
Chapter 8 Security in Wireless Sensor Networks
Chapter 9 Security in Wireless Mesh Networks
Chapter 10 Security in RFID Networks and Communications

精彩书摘

  As mentioned earlier, the phantom flooding routing scheme may result in high energy consumption. When using fiooding in the second phase, it may make the attacker more likely to capture packets and trace the source node faster. On the other hand, if single path routing is used in the second phase, phantom routing can save energy greatly and makes it more difficult for the attacker to trace the source node successfully.
  2. Locatiotn,al angle-based phan,tom routin,g
  The aforementioned phantom routing protocol with single path can balance safety period and energy cost well. However, it uses a pure random walk mechanism to choose the phantom source, which usually enlarges the length of data transmission path which makes the improvement on safety period insignificant.
  In reference [54] the authors proposed a locational angle based phantom routing protocol which improved safety period by reducing "wasting paths". In the proposed protocol, a node selects its relaying node based on a probability determined by the angle at a neighboring node formed by two line segments connecting the source node, the neighboring node and the sink node. The basic idea is to select nodes with larger angles in order to reduce wasting paths and prolong the safety time.
  3. Locatiotn, Ptrotection Route mechan,ism (LPR)
  LPR[59] is proposed to protect the sink location privacy. In this strategy, the attacker model tracing to the sink hop-by-hop is first characterized. The attacker first infers the direction of packet routing by monitoring temporal correlation between wireless communications and then moves towards the sink node in this direction. By tracing packet transmissions continuously, the attacker can finally locate the sink node's location. In LPR, the authors proposed to combine random forwarding and the packet-faking mechanism to defend hop-by-hop attacks.
  ……