|
![]() |
|||
|
||||
OverviewThe current state-of-art in securing computers and data is tantamount to an arms race between the attackers on one hand and the software developers who have to provide the updates to counteract the attacks on the other. This monograph introduces a novel technique for designing secure protocols with provable security guarantees for wireless ad-hoc networks infiltrated with adversarial nodes. It does this by developing a system-theoretical approach to secure protocol design that provides provable and comprehensive security guarantees, where any features of a protocol that reduce complexity or maximize the network throughput do not come at the expense of security. The desired approach is one of security first and performance second, which is the reverse of the current approach. This novel approach uses a game-theoretic framework that addresses the deficiencies in the defense-in-depth approach to securing complex systems. A Clean Slate Approach to Secure Wireless Networking describes in detail the theory of using this approach in both closed synchronized and unsynchronized networks. It will be of interest to all researchers and designers working on securing wireless networks. Full Product DetailsAuthor: Jonathan Ponniah , Yih-Chun Hu , P. R. KumarPublisher: now publishers Inc Imprint: now publishers Inc Dimensions: Width: 15.60cm , Height: 0.60cm , Length: 23.40cm Weight: 0.181kg ISBN: 9781680830484ISBN 10: 1680830481 Pages: 120 Publication Date: 24 August 2015 Audience: College/higher education , Professional and scholarly , Postgraduate, Research & Scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of Contents1: Introduction 2: The Model 3: A Game Between Protocols and Adversarial Strategies 4: Closed Synchronized Networks 5: Secure Clock Synchronization 6: Closed Unsynchronized Networks 7: Conclusion ReferencesReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |