Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous ComputingThis is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their implications explained in terms of security and cooperation, and potential malicious and selfish misdeeds are described along with the existing and future security techniques. Fundamental questions of security including user and device identification; establishment of security association; secure and cooperative routing in multi-hop networks; fair bandwidth distribution; and privacy protection are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor, and RFID networks. Important relationships between trust, security, and cooperation are also discussed. Contains homework problems and tutorials on cryptography and game theory. This text is suitable for advanced undergraduates and graduate students of electrical engineering and computer science, and researchers and practitioners in the wireless industry. Lecture slides and instructor-only solutions available online (www.cambridge.org/9780521873710). |
Common terms and phrases
algorithmic measures asymmetric-key based key asymmetric-key encryption scheme based key transport birthday attack bits block cipher broadcast authentication CBC mode CBC-MAC ciphertext characters collision resistance compression function cryptographic algorithms CTR mode decryption key denoted Diffie–Hellman protocol digital signature ECDSA elements encrypted message ensure entity exhaustive key search hash chain hash value Hence HMAC illustrated in Figure implicit key authentication input block internal iterative hash functions key agreement protocols key chain Key confirmation key establishment protocol key freshness key search attack key size key stream key transport protocol MAC functions MAC value Merkle-trees Message authentication codes Mouth Frog protocol non-desirable nonce OFB mode one-time pad one-way property operation output block physical protection plaintext block plaintext message private key PRNG provides implicit key public key random number secret key sender server session key establishment shared secret symmetric key synchronous stream ciphers TESLA protocol timestamp values assigned verifier Wide Mouth Frog XORed