A Clean Slate Approach to Secure Wireless Networking

Author:   Jonathan Ponniah ,  Yih-Chun Hu ,  P. R. Kumar
Publisher:   now publishers Inc
ISBN:  

9781680830484


Pages:   120
Publication Date:   24 August 2015
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $211.20 Quantity:  
Add to Cart

Share |

A Clean Slate Approach to Secure Wireless Networking


Add your own review!

Overview

The current state-of-art in securing computers and data is tantamount to an arms race between the attackers on one hand and the software developers who have to provide the updates to counteract the attacks on the other. This monograph introduces a novel technique for designing secure protocols with provable security guarantees for wireless ad-hoc networks infiltrated with adversarial nodes. It does this by developing a system-theoretical approach to secure protocol design that provides provable and comprehensive security guarantees, where any features of a protocol that reduce complexity or maximize the network throughput do not come at the expense of security. The desired approach is one of security first and performance second, which is the reverse of the current approach. This novel approach uses a game-theoretic framework that addresses the deficiencies in the defense-in-depth approach to securing complex systems. A Clean Slate Approach to Secure Wireless Networking describes in detail the theory of using this approach in both closed synchronized and unsynchronized networks. It will be of interest to all researchers and designers working on securing wireless networks.

Full Product Details

Author:   Jonathan Ponniah ,  Yih-Chun Hu ,  P. R. Kumar
Publisher:   now publishers Inc
Imprint:   now publishers Inc
Dimensions:   Width: 15.60cm , Height: 0.60cm , Length: 23.40cm
Weight:   0.181kg
ISBN:  

9781680830484


ISBN 10:   1680830481
Pages:   120
Publication Date:   24 August 2015
Audience:   College/higher education ,  Professional and scholarly ,  Postgraduate, Research & Scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

1: Introduction 2: The Model 3: A Game Between Protocols and Adversarial Strategies 4: Closed Synchronized Networks 5: Secure Clock Synchronization 6: Closed Unsynchronized Networks 7: Conclusion References

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List