You are previewing Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications.
O'Reilly logo
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications

Book Description

While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services. Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications examines the current scope of theoretical and practical applications on the security of mobile and wireless communications. This book covers fundamental concepts of current issues, challenges, and solutions in wireless and mobile networks and will serve as a reference for graduate students, professors, and researchers in this emerging field.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
  5. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
  6. Dedication
  7. Preface
  8. Acknowledgment
  9. Section 1: Fundamentals of Mobile and Wireless Communication Networks
    1. Chapter 1: Introduction to Mobile and Wireless Communications Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. WIRELESS COMMUNICATION NETWORKS
      4. CONCLUDING REMARKS
    2. Chapter 2: Security in Wireless Metropolitan Area Networks
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. FUNDAMENTALS OF WIMAX AND LTE
      4. 3. SECURITY GOALS AND SOLUTIONS OF WIMAX AND LTE
      5. 4. SECURITY VULNERABILITIES, THREATS, AND COUNTERMEASURES OF WIMAX AND LTE
      6. 5. SUMMARY
  10. Section 2: Physical Layer Security
    1. Chapter 3: Physical Layer Security and Its Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. MODELS IN PHYSICAL LAYER SECURITY
      4. TYPES OF SECURITY ATTACKS
      5. INFORMATION THEORETIC LIMITS OF PHYSICAL LAYER KEY GENERATION
      6. QUANTIZATION METHODS
      7. RECONCILIATION METHODS
      8. ENHANCED SECURITY WITH MIMO SYSTEM
      9. KEY GENERATION USING RECONFIGURABLE ANTENNAS
      10. ENHANCED SECURITY WITH MULTIPLE RELAY SYSTEM
      11. APPLICATION SCENARIOS
      12. CONCLUSION
    2. Chapter 4: Physical Layer Security in Wireless Communication Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. REQUIREMENTS, ISSUES, AND SOLUTION APPROACHES
      4. PHYSICAL LAYER SECURITY SOLUTIONS
      5. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
      6. APPENDIX: REVIEW QUESTIONS
  11. Section 3: Vehicular Communications and Networking
    1. Chapter 5: Security and Connectivity Analysis in Vehicular Communication Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. 1. VEHICULAR AD-HOC NETWORK MODEL
      4. 2. STATISTICAL DISTRIBUTIONS OF INTER-VEHICLE SPACING
      5. 3. INTER-VEHICLE INFORMATION SECURITY
      6. 4. A SECURITY SCHEME FOR VANET
      7. 5. FURTHER RESEARCH DIRECTIONS
      8. 6. SUMMARY
    2. Chapter 6: Location Security in Vehicular Wireless Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. 1.2 BACKGROUND AND TERMINOLOGIES
      4. 1.3 POSITION INTEGRITY
      5. 1.5 POSITION AVAILABILITY
      6. 1.6 SUMMARY
    3. Chapter 7: Misbehavior Detection in VANET
      1. ABSTRACT
      2. INTRODUCTION
      3. PRELIMINARIES
      4. MISBEHAVIOR DETECTION SCHEMES
      5. CONCLUSIONS
    4. Chapter 8: Intrusion Detection in Vehicular Ad-Hoc Networks on Lower Layers
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. INTRUSION IN VANETS
      5. INTRUSION DETECTION ON PHY LAYER
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. APPENDIX: REVIEW QUESTIONS
  12. Section 4: Mobile Ad Hoc Networks
    1. Chapter 9: Security Issues in Mobile Ad Hoc Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. SECURITY CHALLENGES IN MANETS
      4. CLASSIFICATION OF THE SECURITY ATTACKS
      5. ATTACKS ON DIFFERENT LAYERS OF THE INTERNET MODEL FOR MANETS
      6. SECURITY MECHANISM
      7. CONCLUSION AND FUTURE DIRECTIONS
      8. APPENDIX: REVIEW QUESTIONS
    2. Chapter 10: Security and Privacy in Mobile Ad hoc Social Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. MOBILE AD HOC SOCIAL NETWORKS (MASN)
      4. ROUTING PROTOCOLS IN MASN
      5. VULNERABILITIES AND PROTECTION TOOLS FOR MASN
      6. WORM/BLACK HOLE ATTACK
      7. CONCLUSION
      8. APPENDIX - REVIEW QUESTIONS
  13. Section 5: Trust and Privacy in Mobile and Wireless Communications
    1. Chapter 11: A Multi-Parameter Trust Framework for Mobile Ad Hoc Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER
      5. THE MISBEHAVIOUR DETECTION FOR MTFM
      6. CONCLUSIONS
      7. FUTURE RESEARCH DIRECTIONS
    2. Chapter 12: Trust Management and Modeling Techniques in Wireless Communications
      1. ABSTRACT
      2. INTRODUCTION
      3. TRUST MANAGEMENT IN WIRELESS NETWORKS
      4. PHASES IN THE TRUST COMPUTATION PROCESS
      5. CONCLUSION
      6. APPENDIX: REVIEW QUESTIONS
    3. Chapter 13: Privacy Protection in Vehicular Ad-Hoc Networks
      1. ABSTRACT
      2. 1. INTRODUCTION AND MOTIVATION
      3. 2. STATE OF THE ART
      4. 3. SYSTEM MODEL
      5. 4. THREAT MODEL AND REQUIREMENTS
      6. 5. OUR PRIVACY-PRESERVING SCHEME
      7. 6. PRIVACY ANALYSIS: MODEL 1
      8. 7. PRIVACY ANALYSIS: MODEL 2
      9. 8.SIMULATION RESULTS
      10. 9. CONCLUDING REMARKS AND DIRECTIONS FOR FUTURE WORK
  14. Section 6: Wireless Sensor Networks
    1. Chapter 14: Security Challenges in Wireless Sensor Network
      1. ABSTRACT
      2. INTRODUCTION
      3. APPLICATIONS OF WIRELESS SENSOR NETWORKS
      4. CHALLENGES OF WIRELESS SENSOR NETWORKS
      5. NECESSARY CONDITIONS FOR A SECURE WSN
      6. THREAT MODELS IN WSN
      7. SECURITY THREATS BASED ON PROTOCOL STACK
      8. PHYSICAL LAYER
      9. DATA LINK LAYER
      10. NETWORK LAYER
      11. TRANSPORT LAYER
      12. APPLICATION LAYER
      13. OPEN RESEARCH ISSUES
      14. CONCLUSION
    2. Chapter 15: Voting Median Base Algorithm for Measurement Approximation of Wireless Sensor Network Performance
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. ALGORITHM APPROACH
      5. EXPERIMENTAL RESULTS
      6. LIMITATIONS OF THE ALGORITHM
      7. CONCLUSION AND FUTURE WORK
      8. Appendix A: Definitions of the Notations Used in the Algorithm Pseudo-code
      9. Appendix B: Listening and Filtering Module Pseudo-Code
      10. Appendix C: Data Analysis and Threshold Test Module Pseudo-code
      11. Appendix D: Decision confidence control module Pseudo-code
      12. Appendix E: Warning packet exchange module Pseudo-code
  15. Section 7: Cloud and Mobile Communications
    1. Chapter 16: Mobile Cloud Computing and Its Security and Privacy Challenges
      1. ABSTRACT
      2. INTRODUCTION
      3. MOBILE CLOUD COMPUTING
      4. SECURITY AND PRIVACY ISSUES OF MOBILE CLOUD
      5. SECURITY AND PRIVACY APPROACHES FOR MOBILE CLOUD
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. APPENDIX
      9. Review Questions
    2. Chapter 17: State of the Art for Near Field Communication
      1. ABSTRACT
      2. INTRODUCTION
      3. NFC OPERATION MODES
      4. NFC STANDARDS
      5. HARDWARE ARCHITECTURE
      6. NFC DATA FORMATS
      7. APPLICATIONS OF NFC
      8. NFC SAFETY AND SECURITY CHALLENGES
      9. SAFETY AND SECURITY IN NFC MOBILE PAYMENT SYSTEMS
      10. LATEST NFC TECHNOLOGY DEVELOPMENTS
    3. Chapter 18: Modeling and Verification of Cooperation Incentive Mechanisms in User-Centric Wireless Communications
      1. ABSTRACT
      2. INTRODUCTION
      3. COOPERATION INCENTIVES
      4. COOPERATION FRAMEWORK
      5. VERIFICATION OF THE COOPERATION FRAMEWORK
      6. CONCLUSION AND FUTURE RESEARCH
      7. APPENDIX
  16. Section 8: Wireless Network Management and Analysis
    1. Chapter 19: Seamless Mobility Management
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. DESCRIPTION OF SCHEMES
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. APPENDIX
    2. Chapter 20: 900MHz Spectrum Refarming Analysis for UMTS900 Deployment
      1. ABSTRACT
      2. INTRODUCTION
      3. TECHNICAL FEASIBILITY FROM NETWORK PERSPECTIVE
      4. UMTS900 REFARMING A CASE STUDY ON SANDWICH MODE
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
  17. Compilation of References
  18. About the Contributors