9781466515659-1466515651-Intrusion Detection in Wireless Ad-Hoc Networks

Intrusion Detection in Wireless Ad-Hoc Networks

ISBN-13: 9781466515659
ISBN-10: 1466515651
Edition: 1
Author: Nabendu Chaki, Rituparna Chaki
Publication date: 2014
Publisher: CRC Press
Format: Hardcover 258 pages
FREE US shipping
Buy

From $68.75

Book details

ISBN-13: 9781466515659
ISBN-10: 1466515651
Edition: 1
Author: Nabendu Chaki, Rituparna Chaki
Publication date: 2014
Publisher: CRC Press
Format: Hardcover 258 pages

Summary

Intrusion Detection in Wireless Ad-Hoc Networks (ISBN-13: 9781466515659 and ISBN-10: 1466515651), written by authors Nabendu Chaki, Rituparna Chaki, was published by CRC Press in 2014. With an overall rating of 3.5 stars, it's a notable title among other books. You can easily purchase or rent Intrusion Detection in Wireless Ad-Hoc Networks (Hardcover) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.

This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems.

  • Addresses architecture and organization issues
  • Examines the different types of routing attacks for WANs
  • Explains how to ensure Quality of Service in secure routing
  • Considers honesty and trust-based IDS solutions
  • Explores emerging trends in WAN security
  • Describes the blackhole attack detection technique

Surveying existing trust-based solutions, the book explores the potential of the CORIDS algorithm to provide trust-based solutions for secure mobile applications. Touching on more advanced topics, including security for smart power grids, securing cloud services, and energy-efficient IDSs, this book provides you with the tools to design and build secure next-generation wireless networking environments.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book