0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (6)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

Securing Emerging Wireless Systems - Lower-layer Approaches (Hardcover, 1st Edition.
2nd Printing. 2008): Yingying Chen,... Securing Emerging Wireless Systems - Lower-layer Approaches (Hardcover, 1st Edition. 2nd Printing. 2008)
Yingying Chen, Wenyuan Xu, Wade Trappe, YanYong Zhang
R2,844 Discovery Miles 28 440 Ships in 10 - 15 working days

Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a collection of defense mechanisms that operate at the lower-layers of the protocol stack and can defend wireless systems before the effects of attacks propagate up to higher-level applications and services.

The book will focus on fundamental security problems that involve properties unique to wireless systems, such as the characteristics of radio propagation, or the location of communicating entities, or the properties of the medium access control layer. Specifically, the book provides detection mechanisms and highlights defense strategies that cope with threats to wireless localization infrastructure, attacks on wireless networks that exploit entity identity (i.e. spoofing attacks), jamming and radio interference that can undermine the availability of wireless communications, and privacy threats where an adversary seeks to infer spatial and temporal contextual information surrounding wireless communications. Additionally, the authors explore new paradigms of physical layer security for wireless systems, which can support authentication and confidentiality services by exploiting fading properties unique to wireless communications.

Securing Wireless Communications at the Physical Layer (Hardcover, 2010 ed.): Ruoheng Liu, Wade Trappe Securing Wireless Communications at the Physical Layer (Hardcover, 2010 ed.)
Ruoheng Liu, Wade Trappe
R5,762 R4,456 Discovery Miles 44 560 Save R1,306 (23%) Ships in 12 - 17 working days

Securing communications is a challenging task. A ?rst attempt at security involves learning basic cryptography, and applying encryption algorithms to make messages unintelligible to adversaries. However, rarely is the task of securing a message - changesosimple.Whenonestepsbackandcontemplateshowtosecuretheexchange of communications, one realizes that the challenge is fundamentally one of bui- ing a complete solution. For example, one must ensure that all entities involved have proper and authenticated cryptographic material, or one must ensure that one veri?ably knows to whom one is communicating, or one must understand how the communication process takes place so as to make certain there are no vulnerabilities introduced by the communication process itself. Thislastissue, namelythatsecuritymethodsareoftenbuiltwithoutconsideration to how communication takes place, represents a fundamental gap where much of modern security research has fallen short.The security literature is ?lled with a mass of articles on cryptographic primitives and, although there are still many theoretical hurdlestobeovercomebythecryptographiccommunity,mostoftheseshortcomings areacademicandtherearenownumeroustextbooksoncryptographythatcanprovide thebasicintroductionneededtoemploycryptographicprimitives. Ontheothersideof thecoin,thesecurityliteratureisalso?lledwithamassofarticlesdevotedtobuilding secure protocols and, similarly, there are now numerous textbooks on computer securitythatprovidetheinstructionneededtodesignsecureprotocols.Unfortunately, the issue of how communication takes place or, more speci?cally, whether there are any speci?c issues that might arise or be circumvented because message exchanges aretakingplaceononemediumversusanother(e.g., wirelesscommunicationversus wired communication), is generally neglected.

Network-Aware Security for Group Communications (Hardcover, 2008 ed.): Yan Sun, Wade Trappe, K.J. Ray Liu Network-Aware Security for Group Communications (Hardcover, 2008 ed.)
Yan Sun, Wade Trappe, K.J. Ray Liu
R2,973 Discovery Miles 29 730 Ships in 10 - 15 working days

Group-oriented communications will play a significant role in the next generation of networks as many services, such as pay-per-view media broadcasts and the delivery of network control messages, will rely upon the ability to reliably deliver data simultaneously to a large group of users. As these networks become increasingly pervasive and these multi-user services become increasingly ubiquitous, it will become essential that a complementary suite of security solutions are deployed in order to protect these services from a broad spectrum of security threats that are unique to group communications.

Securing Wireless Communications at the Physical Layer (Paperback, 2010 ed.): Ruoheng Liu, Wade Trappe Securing Wireless Communications at the Physical Layer (Paperback, 2010 ed.)
Ruoheng Liu, Wade Trappe
R4,262 Discovery Miles 42 620 Ships in 10 - 15 working days

Securing communications is a challenging task. A ?rst attempt at security involves learning basic cryptography, and applying encryption algorithms to make messages unintelligible to adversaries. However, rarely is the task of securing a message - changesosimple.Whenonestepsbackandcontemplateshowtosecuretheexchange of communications, one realizes that the challenge is fundamentally one of bui- ing a complete solution. For example, one must ensure that all entities involved have proper and authenticated cryptographic material, or one must ensure that one veri?ably knows to whom one is communicating, or one must understand how the communication process takes place so as to make certain there are no vulnerabilities introduced by the communication process itself. Thislastissue, namelythatsecuritymethodsareoftenbuiltwithoutconsideration to how communication takes place, represents a fundamental gap where much of modern security research has fallen short.The security literature is ?lled with a mass of articles on cryptographic primitives and, although there are still many theoretical hurdlestobeovercomebythecryptographiccommunity,mostoftheseshortcomings areacademicandtherearenownumeroustextbooksoncryptographythatcanprovide thebasicintroductionneededtoemploycryptographicprimitives. Ontheothersideof thecoin,thesecurityliteratureisalso?lledwithamassofarticlesdevotedtobuilding secure protocols and, similarly, there are now numerous textbooks on computer securitythatprovidetheinstructionneededtodesignsecureprotocols.Unfortunately, the issue of how communication takes place or, more speci?cally, whether there are any speci?c issues that might arise or be circumvented because message exchanges aretakingplaceononemediumversusanother(e.g., wirelesscommunicationversus wired communication), is generally neglected.

Pervasive Wireless Environments: Detecting and Localizing User Spoofing (Paperback, 2014 ed.): Jie Yang, Yingying Chen, Wade... Pervasive Wireless Environments: Detecting and Localizing User Spoofing (Paperback, 2014 ed.)
Jie Yang, Yingying Chen, Wade Trappe, Jerry Cheng
R1,647 Discovery Miles 16 470 Ships in 10 - 15 working days

This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sensor networks. Readers are equipped to understand several system models. One attack detection model exploits the spatial correlation of received signal strength (RSS) inherited from wireless devices as a foundation. Through experiments in practical environments, the authors evaluate the performance of the spoofing attack detection model. The brief also introduces the DEMOTE system, which exploits the correlation within the RSS trace based on each device s identity to detect mobile attackers. A final chapter covers future directions of this field. By presenting complex technical information in a concise format, this brief is a valuable resource for researchers, professionals, and advanced-level students focused on wireless network security."

Securing Emerging Wireless Systems - Lower-layer Approaches (Paperback, Softcover reprint of hardcover 1st ed. 2009): Yingying... Securing Emerging Wireless Systems - Lower-layer Approaches (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Yingying Chen, Wenyuan Xu, Wade Trappe, YanYong Zhang
R2,812 Discovery Miles 28 120 Ships in 10 - 15 working days

Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a collection of defense mechanisms that operate at the lower-layers of the protocol stack and can defend wireless systems before the effects of attacks propagate up to higher-level applications and services.

The book will focus on fundamental security problems that involve properties unique to wireless systems, such as the characteristics of radio propagation, or the location of communicating entities, or the properties of the medium access control layer. Specifically, the book provides detection mechanisms and highlights defense strategies that cope with threats to wireless localization infrastructure, attacks on wireless networks that exploit entity identity (i.e. spoofing attacks), jamming and radio interference that can undermine the availability of wireless communications, and privacy threats where an adversary seeks to infer spatial and temporal contextual information surrounding wireless communications. Additionally, the authors explore new paradigms of physical layer security for wireless systems, which can support authentication and confidentiality services by exploiting fading properties unique to wireless communications.

Network-Aware Security for Group Communications (Paperback, Softcover reprint of hardcover 1st ed. 2008): Yan Sun, Wade Trappe,... Network-Aware Security for Group Communications (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Yan Sun, Wade Trappe, K.J. Ray Liu
R2,797 Discovery Miles 27 970 Ships in 10 - 15 working days

This book aims to fill a growing need in the research community for a reference that describes the state-of-the-art in securing group communications. It focuses on tailoring the security solution to the underlying network architecture (such as the wireless cellular network or the ad hoc/sensor network), or to the application using the security methods (such as multimedia multicasts).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
RubA!iyA!t of Omar KhayyA!m: Rendered…
Omar Khayyam Paperback R438 Discovery Miles 4 380
A Radical Awakening - Turn Pain into…
Shefali Tsabary Paperback  (7)
R470 R376 Discovery Miles 3 760
Canadian Mystery Stories
Alberto Manguel Paperback R596 Discovery Miles 5 960
Shakespeare's History of King Henry the…
William Shakespeare Hardcover R728 Discovery Miles 7 280
Pliny the Younger: 'Epistles' Book II
Pliny the Younger Hardcover R2,169 Discovery Miles 21 690
Highest Bidder
Willow Winters, Lauren Landish Hardcover R1,005 Discovery Miles 10 050
Eat, Drink & Blame The Ancestors - The…
Ndumiso Ngcobo Paperback R375 Discovery Miles 3 750
The Short Story in English
Neil Besner, David Staines Paperback R1,397 Discovery Miles 13 970
Wild Cards XII: Turn of the Cards
George R. R. Martin, Victor Milan Paperback R579 Discovery Miles 5 790
Your Personal Horoscope 2023
Joseph Polansky Paperback R330 R264 Discovery Miles 2 640

 

Partners