Table of Contents:
  • Cover -TOC36;Contents -Preface -Foreword -Acknowledgments
  • CH36;1 Introduction -146;1 Definition of Wireless Ad Hoc Networks -146;2 Applications of Wireless Ad Hoc Networks -146;3 Threats44; Attacks44; and Vulnerabilities -146;346;1 Threats -146;346;2 Vulnerabilities in Ad Hoc Networks -146;346;3 Attacks -146;4 Overview of the Book
  • CH36;2 Basic Security Concepts -246;1 Introduction -246;2 Basic Concepts -246;246;1 Attributes -246;246;2 Cryptographic Primitives -246;3 Modes of Operation -246;4 Miscellaneous Properties -246;446;1 One45;Way Property of Hash Chains -246;446;2 TESLA -246;5 Summary
  • CH36;3 Key Management -346;1 Introduction -346;2 Traditional Solution -346;3 Solutions for Ad Hoc Networks -346;346;1 Asymmetric Key45;Based Approach -346;346;2 Symmetric Key45;Based Approach -346;4 Summary
  • CH36;4 Secure Routing -446;1 Introduction -446;146;1 Distance45;Vector and Link45;State Routing -446;146;2 Proactive vs Reactive Routing -446;2 Ad Hoc On45;Demand Distance Vector -446;246;1 Secure AODV -446;246;2 Authenticated Routing for Ad Hoc Networks 40;ARAN41; -446;246;3 Security45;Aware Ad Hoc Routing -446;3 Dynamic Source Routing Protocol -446;346;1 Secure Routing Protocol -446;346;2 Ariadne -446;346;3 EndairA58; A Provably Secure Routing Protocol -446;4 Destination45;Sequenced Distance45;Vector Routing Protocol -446;446;1 Secure Efficient Distance Vector Routing 40;SEAD41; -446;446;2 SuperSEAD -446;446;3 S45;DSDV -446;5 Optimized Link45;State Routing Protocol - 446;546;1 Secure Extension to OLSR -446;546;2 Secure Link45;State Routing Protocol -446;6 Anonymous Routing Protocols -446;646;1 ANODR -446;646;2 MASK -446;7 Generic Attacks Against Routing -446;746;1 Wormhole Attacks -446;746;2 Rushing Attacks -446;746;3 Sybil Attacks -446;8 Summary
  • CH36;5 Intrusion Detection Systems -546;1 Introduction -546;146;1 Traditional IDS Systems -546;2 Unique IDS Challenges in MANET -546;3 Threat Model -546;4 Architecture for Intrusion Detection in MANET -546;446;1 Noncollaborative Intrusion Detection System -546;446;2 Cooperative Intrusion Detection -546;446;3 Key Novel Concepts for Cooperative Intrusion Detection in MANET -546;5 Evidence Collection -546;546;1 Local Evidence -546;546;2 Promiscuous Monitoring -546;546;3 Evidence made Available by Other Nodes -546;6 Detection of Specific Attacks -546;646;1 Detection of Packet Dropping Attacks -546;646;2 Detection of Attacks Against Routing Protocols -546;7 Summary
  • CH36;6 Policy Management -646;1 Introduction -646;2 Policy45;Based Network Management -646;246;1 Overview -646;246;2 Architecture -646;246;3 Policy Languages
  • 646;246;4 Distributed Policy Management Architecture -646;246;5 IETF and DMTF Standardization Activities -646;3 Application of Policy Management to Security Management -646;346;1 Role45;Based Access Control 40;RBAC41; -646;346;2 Trust Management and the KeyNote System -646;346;3 Firewall Management -646;346;4.