Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing
Levente Buttyan, Jean-Pierre Hubaux
Information security has too often been addressed in an a posteriori manner, that is, when most of the system design was complete, or even after system deployment. Wireless networks are no exception in this regard. Consequently, most existing books on wireless network security describe standards and "quick fixes" to extant technologies instead of addressing the fundamental challenges for the years ahead.
The book "Security and Cooperation in Wireless Networks" is unique not only because it addresses the fundamental security concepts of wireless technology but also because it anticipates new challenges, such as security of sensor, ad hoc, mesh, vehicular, and RFID networks. The authors describe possible attacks against these networks in a thorough and comprehensible way, and provide basic techniques to thwart them. An additional reason that makes this book so valuable is that it addresses not only malicious but also selfish behavior. It also includes an original tutorial to game theory and a set of detailed examples of its application to wireless networks.
The clarity of this book and the comprehensive set of slides available on the book's web site make a particularly compelling case for adopting this book as a textbook for a graduate course in computer science and engineering. "Security and Cooperation in Wireless Networks" should also be of considerable interest for researchers and practitioners.
Ссылка удалена правообладателем
----
The book removed at the request of the copyright holder.