Security for Multi-hop Wireless Networks

Nonfiction, Computers, Networking & Communications, Hardware, Science & Nature, Technology, Telecommunications, General Computing
Cover of the book Security for Multi-hop Wireless Networks by Xuemin (Sherman) Shen, Mohamed M. E. A. Mahmoud, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Xuemin (Sherman) Shen, Mohamed M. E. A. Mahmoud ISBN: 9783319046037
Publisher: Springer International Publishing Publication: February 20, 2014
Imprint: Springer Language: English
Author: Xuemin (Sherman) Shen, Mohamed M. E. A. Mahmoud
ISBN: 9783319046037
Publisher: Springer International Publishing
Publication: February 20, 2014
Imprint: Springer
Language: English

This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security for Multi-hop Wireless Networks demonstrates recent research that enhances the efficiency and safety of these key networks. Concise and practical, it is a useful tool for researchers and professionals working in network security. It is also a valuable resource for advanced-level students interested in wireless communications and networking.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security for Multi-hop Wireless Networks demonstrates recent research that enhances the efficiency and safety of these key networks. Concise and practical, it is a useful tool for researchers and professionals working in network security. It is also a valuable resource for advanced-level students interested in wireless communications and networking.

More books from Springer International Publishing

Cover of the book Cricket and Society in South Africa, 1910–1971 by Xuemin (Sherman) Shen, Mohamed M. E. A. Mahmoud
Cover of the book Design for Manufacturability with Advanced Lithography by Xuemin (Sherman) Shen, Mohamed M. E. A. Mahmoud
Cover of the book Managing Talent by Xuemin (Sherman) Shen, Mohamed M. E. A. Mahmoud
Cover of the book Postmodern Theory and Progressive Politics by Xuemin (Sherman) Shen, Mohamed M. E. A. Mahmoud
Cover of the book Atlas of Cutaneous Lymphomas by Xuemin (Sherman) Shen, Mohamed M. E. A. Mahmoud
Cover of the book Global Responses to Conflict and Crisis in Syria and Yemen by Xuemin (Sherman) Shen, Mohamed M. E. A. Mahmoud
Cover of the book Metaheuristic Applications to Speech Enhancement by Xuemin (Sherman) Shen, Mohamed M. E. A. Mahmoud
Cover of the book A Permanent Crisis by Xuemin (Sherman) Shen, Mohamed M. E. A. Mahmoud
Cover of the book Advances in Intelligent Informatics, Smart Technology and Natural Language Processing by Xuemin (Sherman) Shen, Mohamed M. E. A. Mahmoud
Cover of the book Intelligent Computing Systems by Xuemin (Sherman) Shen, Mohamed M. E. A. Mahmoud
Cover of the book Plasma and Thermal Spraying by Xuemin (Sherman) Shen, Mohamed M. E. A. Mahmoud
Cover of the book Frontiers in Gynecological Endocrinology by Xuemin (Sherman) Shen, Mohamed M. E. A. Mahmoud
Cover of the book Computer Aided Verification by Xuemin (Sherman) Shen, Mohamed M. E. A. Mahmoud
Cover of the book Kasimir Twardowski by Xuemin (Sherman) Shen, Mohamed M. E. A. Mahmoud
Cover of the book Theory and Practice of Natural Computing by Xuemin (Sherman) Shen, Mohamed M. E. A. Mahmoud
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy