Cover image for Security in Ad-Hoc and Sensor Networks.
Security in Ad-Hoc and Sensor Networks.
Title:
Security in Ad-Hoc and Sensor Networks.
Author:
Beyah, Raheem.
ISBN:
9789814271097
Personal Author:
Physical Description:
1 online resource (419 pages)
Series:
Computer and Network Security ; v.3

Computer and Network Security
Contents:
Contents -- Preface -- Scope of Book -- Authentication and Confidentiality -- Privacy -- Reliability -- Network Management -- Part 1: Authentication and Confidentiality -- Chapter 1 Authentication and Confidentiality in Wireless Ad Hoc Networks Anjum Naveed and Salil Kanhere -- 1. Introduction -- 2. Security Issues Relating Authentication and Confidentiality -- 3. Characteristics of Security Services -- 4. Authentication in Wireless Ad Hoc Networks -- 4.1. Symmetric Cryptographic Techniques -- 4.2. Asymmetric Cryptographic Techniques -- 4.3. Collaborative Mechanisms -- 4.4. Certificate Revocation for Wireless Ad Hoc Networks -- 5. Confidentiality in Wireless Ad Hoc Networks -- 6. Standardization Efforts -- 6.1. Mutual Authentication Using IEEE 802.1X Standard -- 6.2. Confidentiality and Origin Authentication -- 6.3. Vulnerabilities in IEEE 802.11i and Security Attacks -- 6.3.1. IEEE 802.1X Vulnerabilities -- 6.3.2. Four-way Handshake Vulnerabilities -- 6.3.3. CCMP Encryption Vulnerabilities -- 7. Open Issues -- 8. Conclusion -- References -- Chapter 2 Key Distribution Mahalingam Ramkumar -- 1. Introduction -- 1.1. Requirements and Constraints -- 1.1.1. Scope of Cryptographic Security Associations -- 1.1.2. Types of Security Associations -- 1.1.3. Overhead -- 1.2. Organization -- 2. Key Distribution Schemes -- 2.1. KDS Requirements -- 2.2. Schemes Based on Asymmetric Cryptography -- 2.2.1. Certi.cate Based Schemes -- 2.2.2. Identity (ID) Based Schemes -- 3. Schemes Based on Symmetric Cryptography -- 3.1. CB Schemes for One-to-many SAs -- 3.1.1. TESLA -- 3.1.2. One-Time Signatures (OTS) -- 3.1.3. Merkle Tree -- 3.1.4. Per-use (PU) Hash Chains -- 3.2. ID Based Key Predistribution Schemes -- 3.2.1. Deterministic and Probabilistic KPSs -- 3.2.2. Blom's Deterministic Scheme -- 3.2.3. Key Subset and Symmetric Certi.cates (KSSC) Scheme.

3.2.4. Blom's Scheme vs KSSC -- 3.3. A "Nonscalable" Key Predistribution Scheme -- 3.3.1. Modi.ed Leighton-Micali Scheme -- 4. The Cost of Security Associations -- 4.1. Overhead -- 4.1.1. Computational Overhead -- 4.1.2. In-network Bandwidth Overhead -- 4.1.3. Storage and Out-of-Network Bandwidth Overhead -- 4.2. The Cost of Resources -- 4.3. Protection of Secrets -- 4.4. User Agent and Network Agent KDSs -- 5. Choice of Key Distribution Schemes -- 5.1. Brief Overview of MANET Routing Protocols -- 5.2. Authentication of Routing Data -- 5.2.1. Redundancies in Routing Protocols -- 5.2.2. Distance Vector Protocols -- 5.2.3. On-Demand Protocols -- 5.2.4. Link-State Protocols -- 5.3. Protocol Independent Authentication -- 5.3.1. Logical Neighborhoods -- 5.3.2. User-Agent One-Hop Signatures -- 6. Conclusions -- References -- Chapter 3 Key Pre-Distribution for Sensor Networks Using Group Deployment Knowledge Donggang Liu, Peng Ning and Wenliang Du -- 1. Introduction -- 2. Group-Based Deployment Model -- 3. A Framework for Group-Based Key Pre-Distribution -- 3.1. Pre-Distribution -- 3.2. Direct Key Establishment -- 3.3. Path Key Establishment -- 4. Seeking Efficient Instantiations -- 4.1. Overview -- 4.2. Hash Key-Based Instantiation -- 4.3. Polynomial-Based Instantiation -- 5. Evaluation -- 5.1. Overhead -- 5.2. Establishing Direct Keys -- 5.3. Establishing Indirect Keys -- 5.4. Security Analysis -- 5.4.1. Impact on Direct Key Establishment -- 5.4.2. Impact on Path Key Establishment -- 5.5. Discussion -- 6. Related Work -- 7. Conclusion and Future Work -- References -- Part 2: Privacy -- Chapter 4 Location Privacy Sergio Armenia, Laura Galluccio, Alessandro Leonardi, Giacomo Morabito and Sergio Palazzo -- 1. Background -- 1.1. Privacy and Society -- 1.2. Taxonomy -- 1.3. Measure of Privacy -- 2. Location Privacy in Wireless Ad Hoc and Sensor Networks.

2.1. Location Privacy in Ad Hoc Networks -- 2.2. Location Privacy in Sensor Networks -- 3. Performance of Location Privacy Enhancement Solutions -- 3.1. System Model -- 3.2. Privacy Loss Analysis -- 3.3. Cost Analysis -- 3.4. Numerical Examples -- 4. Conclusions -- References -- Chapter 5 On-Demand Anonymous Routing (ODAR) Lichun Bao, Rex Chen and Denh Sy -- 1. Introduction -- 2. ODAR Data Forwarding -- 2.1. Network Assumptions -- 2.2. Anonymity Goals -- 2.3. Bloom Filter -- 2.4. Source Routing Using Bloom Filters -- 3. Anonymity -- 3.1. Intermediate Node Anonymity -- 3.2. End-Host Anonymities -- 3.2.1. Key Server -- 3.2.2. Key Distribution -- 3.2.3. Anonymity in the Route Discovery -- 4. ODAR Routing Control -- 5. Evaluations -- 5.1. Security Analysis -- 5.2. Simulations -- 6. Summary -- Acknowledgment -- References -- Chapter 6 NTRU-Based Confidential Data Transmission in Telemedicine Sensor Networks Fei Hu, Xiaojun Cao, Kyle Wilhelm, Marcin Łukowiak and Stanisław Radziszowski -- 1. Introduction -- 2. Cardiac Sensor Networks (CSNs) -- 3. NTRU Algorithms [12, 14] -- 3.1. Modular Arithmetic -- 3.2. Truncated Polynomial Rings -- 3.3. NTRU Algorithm -- 3.3.1. Notations -- 3.3.2. Public/Private Key -- 3.3.3. Encryption -- 3.3.4. Decryption -- 4. NTRU Security Algorithm: Hardware-Based Implementation -- 4.1. NTRU System Components and Design -- 4.2. Multiplication and Secure Hash Algorithm Modules -- 4.3. Generation Function Modules -- 4.4. Key Generation and Encryption/Decryption Modules -- 5. NTRU Optimizations -- 5.1. Multiplication Operation -- 5.2. Parallelism Operations in the Arithmetic Units -- 5.3. Parallelism Operations in the Supporting Algorithms -- 6. Performance Study -- 6.1. Energy Consumption -- 6.2. Storage Methods and the Relation to N and q -- 7. Conclusions -- Acknowledgments -- References -- Part 3: Reliability.

Chapter 7 Fault-Tolerant Wireless Sensor Networks Xiaoyuan Sherry Li and Janise McNair -- 1. Introduction -- 2. Faults in Sensor Networks -- 2.1. Metrics for Fault Tolerance -- 2.2. Sources of Faults -- 2.2.1. Node Failure -- 2.2.2. Link Failure -- 2.2.3. Network Failure -- 2.3. Fault Pattern -- 2.3.1. Temporal Pattern -- 2.3.2. Geographical Pattern -- 2.3.3. Topology-Related Pattern -- 3. Fault Prevention -- 4. Fault Management -- 4.1. Fault Detection -- 4.2. Fault Recovery -- 5. Fault Management in Cluster-Based Sensor Networks -- 5.1. Cluster-Based Network Model -- 5.2. Fault Detection -- 5.2.1. Static Networks -- 5.2.1.1. Continuous Network -- 5.2.1.2. Event-Driven Network -- 5.2.2. Mobile Networks -- 5.3. Fault-Recovery -- 5.3.1. Routing-Based Recovery -- 5.3.2. Re-Clustering-Based Recovery -- 5.3.2.1. Join a Neighboring Cluster -- 5.3.2.2. Select a New Cluster Head -- 6. Chapter Summary -- References -- Chapter 8 Detecting Data Anomalies in Wireless Sensor Networks Sutharshan Rajasegarar, Christopher Leckie and Marimuthu Palaniswami -- 1. Introduction -- 2. Applications of Anomaly Detection -- 2.1. Intrusion Detection -- 2.2. Event Detection -- 2.3. Quality Assurance -- 3. State of the Art in Anomaly Detection Techniques for WSNs -- 3.1. Types of Anomalies in WSNs -- 3.2. Energy Preserving Techniques in Distributed Anomaly Detection Algorithms for WSNs -- 3.3. Categorisation of Anomaly Detection Techniques -- 3.4. Parametric Techniques -- 3.5. Non-Parametric Techniques -- 3.5.1. Rule Based Approaches -- 3.5.2. CUSUM Based Approaches -- 3.5.3. Data Clustering Approaches -- 3.5.4. Density Based Approaches -- 3.5.5. Nearest Neighbor Based Approaches -- 3.5.6. Kernel Based Approaches -- 3.5.7. Other Approaches -- 4. Comparison of Approaches to Anomaly Detection and Open Issues -- 5. Conclusion -- Acknowledgment -- References.

Chapter 9 Reliable Traffic Information Propagation in Vehicular Ad Hoc Networks Soyoung Park, Cliff Zou and Damla Turgut -- 1. Introduction -- 1.1. Contribution -- 2. Related Work -- 3. VANET Model -- 3.1. Network Model -- 3.2. Adversary Model -- 4. Proposed Approaches -- 4.1. Two-Directional Data Verification -- 4.1.1. Driving Direction -- 4.1.2. Data Aggregation -- 4.1.3. Data Propagation -- 4.1.4. Data Verification Rule -- 4.2. Time-Based Data Verification -- 4.2.1. Data Propagation -- 4.2.2. Data Verification Rule -- 4.2.3. Extension to very Sparse Traffic Situation -- 4.2.4. The Combined Data Veriffication Approach -- 4.3. Comparison between Two Proposed Approaches -- 5. Security and Robustness -- 5.1. Data Integrity -- 5.1.1. Two-Directional Data Verification -- 5.1.2. Time-Based Data Verification -- 5.2. Denial-of-Service (DoS) Attacks -- 5.2.1. Two-Directional Data Propagation -- 5.2.2. Time-Based Data Propagation -- 6. Simulation Study -- 6.1. Simulation Environment and Metrics -- 6.2. Simulation Results -- 6.2.1. Two-Directional Data Propagation -- 6.2.2. Time-Based Data Propagation -- 7. Conclusion -- Acknowledgement -- References -- Part 4: Network Management and Configuration -- Chapter 10 Energy Efficient Network Security Management Sherry Wang, Harold Zheng and Wenye Wang -- 1. Introduction -- 1.1. The Concept of Security Management -- 1.1.1. Policy-Based Management -- 1.2. Resource Consumptions of Security Protocols -- 1.3. Radio Propagation Properties -- 1.3.1. Path Loss -- 1.3.2. Decay Function -- 2. Security Policies and Impact on Quality of Protection -- 2.1. Quality of Protection (QoP) -- 2.2. Individual Security Policies -- 2.3. Hybrid Security Policies -- 2.4. Impact of Security Policies on QoP -- 2.5. Discussion -- 3. Energy Consumption for Securing Wireless Networks -- 3.1. Energy Consumption of Secure Sockets Layer.

3.2. Resource Consumption Analysis.
Abstract:
Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas. Sample Chapter(s). Chapter 1: Authentication and Confidentiality in Wireless Ad Hoc Networks (260 KB). Contents: Authentication and Confidentiality; Privacy; Routing; Reliability; Network Management and Configuration. Readership: Researchers, industry practitioners, graduate and undergraduate students in networking, network security, distributed security and sensor ad hoc security.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: