Security for Multi-hop Wireless Networks

This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead an...

Full description

Bibliographic Details
Main Authors: Mahmoud, Mohamed M. E. A., Shen, Xuemin (Sherman) (Author)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2014, 2014
Edition:1st ed. 2014
Series:SpringerBriefs in Computer Science
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 02182nmm a2200313 u 4500
001 EB000735858
003 EBX01000000000000000587290
005 00000000000000.0
007 cr|||||||||||||||||||||
008 140303 ||| eng
020 |a 9783319046037 
100 1 |a Mahmoud, Mohamed M. E. A. 
245 0 0 |a Security for Multi-hop Wireless Networks  |h Elektronische Ressource  |c by Mohamed M. E. A. Mahmoud, Xuemin (Sherman) Shen 
250 |a 1st ed. 2014 
260 |a Cham  |b Springer International Publishing  |c 2014, 2014 
300 |a XIII, 99 p. 45 illus., 27 illus. in color  |b online resource 
505 0 |a Introduction -- System Model -- Efficient Incentive Scheme -- Secure Routing Protocols -- Conclusions and Future Directions 
653 |a Computer Communication Networks 
653 |a Computer networks  
653 |a Telecommunication 
653 |a Communications Engineering, Networks 
700 1 |a Shen, Xuemin (Sherman)  |e [author] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a SpringerBriefs in Computer Science 
028 5 0 |a 10.1007/978-3-319-04603-7 
856 4 0 |u https://doi.org/10.1007/978-3-319-04603-7?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 004.6 
520 |a This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security for Multi-hop Wireless Networks demonstrates recent research that enhances the efficiency and safety of these key networks. Concise and practical, it is a useful tool for researchers and professionals working in network security. It is also a valuable resource for advanced-level students interested in wireless communications and networking