img Leseprobe Leseprobe

Security for Multi-hop Wireless Networks

Mohamed M. E. A. Mahmoud, Xuemin (Sherman) Shen

PDF
ca. 53,49
Amazon iTunes Thalia.de Weltbild.de Hugendubel Bücher.de ebook.de kobo Osiander Google Books Barnes&Noble bol.com Legimi yourbook.shop Kulturkaufhaus ebooks-center.de
* Affiliatelinks/Werbelinks
Hinweis: Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.

Springer International Publishing img Link Publisher

Naturwissenschaften, Medizin, Informatik, Technik / Datenkommunikation, Netzwerke

Beschreibung

This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security for Multi-hop Wireless Networks demonstrates recent research that enhances the efficiency and safety of these key networks. Concise and practical, it is a useful tool for researchers and professionals working in network security. It is also a valuable resource for advanced-level students interested in wireless communications and networking.

Weitere Titel in dieser Kategorie
Cover Desktop Witness
Michael A. Caloyannides
Cover Inferno Programming with Limbo
Phillip Stanley-Marbell
Cover Dependable Computing
Zbigniew T. Kalbarczyk
Cover LaTeX Cookbook
Stefan Kottwitz

Kundenbewertungen

Schlagwörter

Multi-hop wireless network security, Wireless networks, Secure routing protocols, Trust and payment systems, Packet dropping attack, Multi-hop wireless networks, Network security, Selfish nodes