Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications) Review
Posted by
David Hamer
on 5/19/2012
/
Labels:
assurance,
capstar,
comfortis,
program for cats,
wireless program
Average Reviews:
(More customer reviews)Mesh networks represent a relatively recent technology. In many respects, this book is an ideal companion volume to another book that exhaustively covers mesh: Wireless Mesh Networking: Architectures, Protocols and Standards (Wireless Networks and Mobile Computing)
As soon as mesh networking technology is considered seriously for municipal, commercial or military applications, one of the first questions raised is about security. There is a long history of wireless security and this book builds on that.
Chapters cover a full range of wireless security issues: attacks, intrusion detection, secure routing, hop integrity, privacy preservation, authentication, and key management. The final section of the book covers standards and applications in PANs, LANs, clusters and sensors.
This book digs deep into crypto topics by presenting algorithms, pseudo code, and plenty of mathematical symbols proving out the authors' words. The book can be read at a surface level to gain a general understanding of the topics, but there is enough depth for the expert reader to work through the theory. Chapters are completely footnoted and include bibliographic entries that are good literature reviews of the subject matter.
The first 100+ pages in the book provides a surprisingly good introduction to wireless mesh networks. The introductory material covers PANs, LANs, MANs, and WANs and helps to jumpstart your network knowledge. If you don't know what these three-letter acronyms mean when you start reading this book, you will by the time you finish.
The book is an edited work, and at times reads like a collected series of papers. Consequently, my only criticism, is that later chapters tend to rehash some of the same basic background material presented earlier.
This book covers a wide range of security topics relevant to mesh networks. This book is both a jumpstart on mesh network security and a solid foundation for deeper study into the nuances of security. This book is the place to begin when trying to answer the question, "What about security in mesh networks?"
Click Here to see more reviews about: Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. To achieve these aims, security mechanisms are essential to ensure trusted on-going communications.
Security in Wireless Mesh Networks explores key security challenges set in diverse scenarios, as well as emerging standards that include authentication, access control and authorization, attacks, privacy and trust, encryption, key management, identity management, DoS attacks, intrusion detection and prevention, secure routing, and security policies. The book also examines security mechanisms in IEEE 802.11, IEEE 802.15, IEEE 802.16, and IEEE 802.20 standards. In addition, it provides numerous case studies and applications to facilitate understanding.
As a single, comprehensive guide to security-related issues in WMN, this book is an important resource to have if you are working on the design, selection, and implementation of wireless mesh networks and system components.
0 comments:
Post a Comment