Wireless and Mobile Networks Security Review

Wireless and Mobile Networks Security
Average Reviews:

(More customer reviews)
The editors give an indepth coverage of recent work in the security of a wireless network, where the nodes might be mobile. The network might be using Bluetooth, WiMax or other protocols. The treatment is moderately mathematical, but attention is paid by the authors of the chapters to summarising clearly the motivating ideas of many algorithms. Unsurprisingly, existing mobile telecom networks get much space in the book, because of the sheer size [billions of cellphones worldwide] of their deployments.
The important special case of Wireless Sensor Networks is described in several chapters. Such networks are characterised by low energy levels. The nodes might be deployed by the military, to surveil a hostile territory. The low energy of the node battery means that intensive computations are not practical. Thus cryptography is restricted to symmetric methods, entirely obviating PKI. The nodes also have small memory. These are hard factors when considered in their totality. So problems like trying to detect compromised nodes in a WSN are exceedingly nontrivial. Yet as the text makes clear, several researchers have looked hard at this, and come up with several possibilities to have a WSN against attack.

Click Here to see more reviews about: Wireless and Mobile Networks Security



Buy NowGet 21% OFF

Click here for more information about Wireless and Mobile Networks Security

0 comments:

Post a Comment