SECURITY FOR WIRELESS AD HOC NETWORKS
|
|
- Calvin Barton
- 5 years ago
- Views:
Transcription
1 SECURITY FOR WIRELESS AD HOC NETWORKS
2
3 SECURITY FOR WIRELESS AD HOC NETWORKS Farooq Anjum and Petros Mouchtaris
4 Wiley Bicentennial Logo: Richard J. Pacifico Copyright # 2007 by John Wiley & Sons, Inc. All rights reserved Published by John Wiley & Sons, Inc., Hoboken, New Jersey Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) , fax (978) , or on the web at Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) , fax (201) , or online at Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) , outside the United States at (317) or fax (317) Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at Library of Congress Cataloging-in-Publication Data: Anjum, Farooq. Security for wireless ad hoc networks / by Farooq Anjum & Petros Mouchtaris. p. cm. Includes bibliographical references and index. ISBN: Wireless LANs - - Security measures. I. Mouchtaris, Petros. II. Title TK A dc Printed in the United States of America
5 Dedicated to: My parents (F. A.) My late father (P. M.)
6 CONTENTS Preface Foreword Acknowledgments xi xiii xv 1 Introduction Definition of Wireless Ad Hoc Networks Applications of Wireless Ad Hoc Networks Threats, Attacks, and Vulnerabilities Threats Vulnerabilities in Ad Hoc Networks Attacks Overview of the Book 13 2 Basic Security Concepts Introduction Basic Concepts Attributes Cryptographic Primitives Modes of Operation Miscellaneous Properties One-Way Property of Hash Chains TESLA Summary 38 3 Key Management Introduction Traditional Solution Solutions for Ad Hoc Networks Asymmetric Key-Based Approach Symmetric Key-Based Approach Summary 68 vii
7 viii CONTENTS 4 Secure Routing Introduction Distance-Vector and Link-State Routing Proactive vs Reactive Routing Ad Hoc On-Demand Distance Vector Secure AODV Authenticated Routing for Ad Hoc Networks (ARAN) Security-Aware Ad Hoc Routing Dynamic Source Routing Protocol Secure Routing Protocol Ariadne EndairA: A Provably Secure Routing Protocol Destination-Sequenced Distance-Vector Routing Protocol Secure Efficient Distance Vector Routing (SEAD) SuperSEAD S-DSDV Optimized Link-State Routing Protocol Secure Extension to OLSR Secure Link-State Routing Protocol Anonymous Routing Protocols ANODR MASK Generic Attacks Against Routing Wormhole Attacks Rushing Attacks Sybil Attacks Summary Intrusion Detection Systems Introduction Traditional IDS Systems Unique IDS Challenges in MANET Threat Model Architecture for Intrusion Detection in MANET Noncollaborative Intrusion Detection System Cooperative Intrusion Detection Key Novel Concepts for Cooperative Intrusion Detection in MANET 140
8 CONTENTS ix 5.5 Evidence Collection Local Evidence Promiscuous Monitoring Evidence made Available by Other Nodes Detection of Specific Attacks Detection of Packet Dropping Attacks Detection of Attacks Against Routing Protocols Summary Policy Management Introduction Policy-Based Network Management Overview Architecture Policy Languages Distributed Policy Management Architecture IETF and DMTF Standardization Activities Application of Policy Management to Security Management Role-Based Access Control (RBAC) Trust Management and the KeyNote System Firewall Management Policy Enforcement in a Wireless Ad Hoc Network Summary Secure Localization Introduction Localization Ranging Computation Attacks Secure Localization Distance Bounding Techniques Verifiable Multilateration Directional Antennae-Based Schemes Transmission Range Variation-Based Schemes Hybrid Schemes Malicious Beacons Summary 223
9 x CONTENTS 8 Conclusions and Future Research Vehicular Networks Differences with MANET Open Problems and Solutions Summary 230 Acronyms 231 References 234 Index 245
10 PREFACE Wireless networks, whether cellular networks or wireless local area networks (LANs), have rapidly become an indispensable part of our life. Evidence of this is the widespread usage of such networks in several areas such as office, home, universities, hot-spots such as airports and hotels etc. In addition, the widespread availability of miniature wireless devices such as PDAs, cellular phones, Pocket PCs, and small fixtures on buildings, sensors are one step towards making possible the vision of wireless nirvana a reality. Wireless nirvana is the state of seamless wireless operation where any wireless device would be able to connect to any other wireless device or network at any time, in any place while satisfying the requirements of the user of the device. But as is obvious, we are still a long way off from the goal of wireless nirvana. Technology under development for wireless ad hoc networks is enabling our march toward this end goal; however the security concerns in wireless networking remains a serious impediment to widespread adoption. The underlying radio communication medium for wireless networks is a big vulnerability that can be exploited to launch several attacks against wireless networks. In addition, wireless ad hoc networks usually cannot depend on traditional infrastructure found in enterprise environments such as dependable power sources, high bandwidth, continuous connectivity, common network services, well-known membership, static configuration, system administration, and physical security. Without adequate security, enterprises will shy away from the use of wireless ad hoc networks, governmental agencies will ban the use of wireless ad hoc networks, defense organizations might be unable to guarantee the safety of their personnel in battlefield scenarios and users will be liable for actions that they never committed. Therefore, security of such wireless ad hoc networks is an important area that needs to be addressed if such networks are to be widely used. There are two ways of doing this. One way is for the researchers in this field to identify open problems and provide solutions to the identified open problems. Each such effort makes these wireless networks a little bit more secure. There have been several research efforts in the last couple of years exploring ways of making such networks more secure although much more work still needs to be done. We ourselves have also been engaged in this activity. The second way to address the security issues of such networks is to disseminate widely the known results to the beginners in this field. This will allow more people to comprehend the problems and contribute towards expanding the knowledge in this area. Unfortunately there has not been any work done along these lines. Our effort in this book is focused on this approach of dissemination of known knowledge in the area of security in wireless ad hoc networks. To our knowledge, this book is the first book that focuses exclusively on the topic of security for wireless ad hoc networks. The topic of security in wireless ad hoc networks itself is very vast. This topic spans areas such as securing networking protocols, operating systems on mobile devices, and applications etc. In this book we focus on the topic of xi
11 xii PREFACE securing network protocols in wireless ad hoc networks. Note that networking in ad hoc networks is concerned with enabling two devices with wireless interfaces to communicate with each other. The objective of this book is to make the readers aware of the fundamentals of the area of security of wireless networks as well as the open problems. This will hopefully spur much more activity in this area in the upcoming years. This book provides a broad and comprehensive overview of the research that has been done to date on the security of wireless ad hoc networks and discusses the advantages and disadvantages of the various schemes that have been proposed in the literature. Given the objective of this book, it is necessary to write it in a style that does not assume a detailed knowledge of many concepts. Therefore, in writing this book, the only requirement that we assumed from the reader is a basic understanding of networking concepts. Given this, we explain the concepts of wireless ad hoc networks at a fairly basic level. We also require limited knowledge of security concepts from the reader. We provide a chapter that introduces the basic security concepts that are required for the rest of the book. This book will be of interest to a wide variety of people. A beginner in the field will benefit from a simple description of the various problems and solutions. Such a person will also gain by having a ready compendium of important results in this area thereby saving such a person from the problem of information overload. Thus, this book can be used as a textbook in the first class focusing on security in ad hoc networks. Researchers focusing on wireless networks that would like to consider the security implications of the protocols they are designing would benefit from a description of known problems and solutions to these known problems. Additionally, researchers focusing on novel security schemes for wireless ad hoc networks that would like to become aware of existing research should also profit from the description of various schemes in this book. This will let them know about what is out there and what is needed. Finally, this should also be a valuable book for researchers focusing on applications of wireless ad hoc networks in a commercial or military environment. All these groups comprise the intended audience of the book. Of course, we do not expect this effort to be perfect. Errors might have crept in; some other topics that you, the reader, feel are important might have been left out. In some cases, our comments on the problems and their solutions would have been biased due to our backgrounds. There will be other ways also in which the book could be improved. We would like to hear from you, the reader, on each of these aspects. Therefore, feel free to write to us on these or any other topic that you feel is relevant to the book. And if you enjoyed reading the book, we would like to hear about that also. We also have a blog at where such errata or our responses to your comments will be provided. This title can be accessed at the following FTP site: ftp://ftp.wiley.com/public/sci_tech_med/security_wireless/ In the meantime, happy reading. Farooq Anjum fanjum@telcordia.com Petros Mouchtaris pmouchta@telcordia.com
12 FOREWORD Rapid and automatic establishment of wireless networks and services in the absence of a fixed infrastructure is one of the big challenges of communication. The complexity of the problem is greatly compounded when the nodes of the network have to accommodate rapid and unpredictable motion, dynamically altering the connectivity of the network itself. The attractiveness and value of such ad hoc networks rests on their ability to meet performance parameters hard to achieve otherwise and to do so while optimizing the use of resources such as spectrum, energy, and operations support functions at scale. A final dimension of this multidisciplinary problem is the achievement of a solution which in some sense minimizes the probability of disruption from natural and malicious threats and at the same time maximizes availability assuring authorized users access to critical services. This book captures the current state of the art in wireless ad hoc networks with an emphasis on security and assurance. In the last decade researchers have explored many potential applications of wireless ad hoc networks. The research has ranged from basic theoretical investigations to prototypes and demonstrations. The largest body of work has been in the government arena. The Department of Defense has invested seriously in exploiting wireless ad hoc networks in its transformational programs. Telcordia has been at the forefront of both creating new network technologies and exploring newer approaches for securing such networks. This has involved leveraging ideas from basic science to propose engineering principles for designing and deploying such networks. It has also involved construction of proofof-principle testbeds, prototypes, demonstrations, and the steps necessary to transition the technology to general use. While there are many problems still to be solved, it has been gratifying to see the technology move from a concept to reality. Over this span of time there has been stalwart support for these efforts from agencies such as the Army Research Lab (ARL), the Army Communications Electronics Research, Development and Engineering Center (CERDEC), and DARPA. On the commercial and public sector front the technology has been developing more slowly but is finding its way into many applications. These include transportation networks, emergency response, law enforcement, and sensor systems. Perhaps the greatest use of this technology will be to fill the gap in fixed infrastructure which will allow public wireless systems to really achieve the goal of delivering applications to any place through hybrid networks of cellular and ad hoc components. In performing the research which is codified in this book, one of the ingredients that the authors bring to the table is the knowledge and intuition of real communications systems and applications. In a commercial setting with clients who are used to hardened products that affect a large customer base the non-functional attributes of solutions are just as important as the functional aspects. The delivery of a service over a network can sometimes be demonstrated easily. When the requirement is to build it out at scale with high reliability and availability and with a high degree of security what may seem as an easy xiii
13 xiv FOREWORD problem suddenly becomes hard. One of the values of this book is to expose the reader to such issues in an expository and complete way indicating the parts of the problem that have been solved and the parts that still require further investigation. In closing I would like to commend both Petros Mouchtaris and Farooq Anjum for the professionalism and dedication they have shown in writing this book. They both have highly demanding jobs, so this task took a lot of extra effort. I hope that they get positive feedback and feel the satisfaction they deserve for the excellent job they have done in collecting, codifying, and explaining the advanced material that comprises this important book. Adam Drobot President, Applied Research Telcordia Technologies
14 ACKNOWLEDGMENTS We would like to start by thanking the management of Telcordia who made it possible for us to not only entertain the idea of writing this book, but also executing the idea. Showstopper issues such as copyright were addressed very efficiently which again was due to the Telcordia culture. We would like to thank in particular the president of Applied Research, Adam Drobot, who encouraged us to pursue writing this book. The book itself would not have been possible if not for the efforts of the various people working in this field. These people not only identified the problems in this area but also provided solutions to such problems. In this book, we tried to identify various interesting research problems in the field and discuss approaches that have been pursued by various researchers. Names of such people are scattered all over the book in the form of references to their works that we explain in each of the chapters. We also benefited much from comments on the various chapters of the book provided by various people working in this area. We are very grateful to Srdjan Capkun, Peng Ning, Adrian Perrig, Santosh Pandey, Rajesh Talpade, Ritu Chadha and Mike Little for their comments which resulted in a better manuscript. Writing a book is never easy especially on the families of the authors. The hours of sacrifice needed on the part of the spouses and also their efforts to ensure that the authors are in the right frame of mind is something that we are sure every author appreciates and cannot put a cost to. On this front, the first author is very thankful to Ambareen while the second author is very thankful to Donna. We are also very thankful to the team at John Wiley who made the entire process as painless as possible to us. We would be failing if we do not mention Whitney Lesch who was in constant touch with us to address any questions we had about the book. xv
Real-Time Optimization by Extremum-Seeking Control
Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control KARTIK B. ARIYUR MIROSLAV KRSTIĆ A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2003 by John Wiley
More informationLEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS
More informationLEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS
More informationRelational Database Index Design and the Optimizers
Relational Database Index Design and the Optimizers DB2, Oracle, SQL Server, et al. Tapio Lahdenmäki Michael Leach A JOHN WILEY & SONS, INC., PUBLICATION Relational Database Index Design and the Optimizers
More informationIP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H
IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H Daniel Minoli A JOHN WILEY & SONS, INC., PUBLICATION IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H IP MULTICAST WITH APPLICATIONS TO
More informationCOSO Enterprise Risk Management
COSO Enterprise Risk Management COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc. Copyright # 2007,
More informationTASK SCHEDULING FOR PARALLEL SYSTEMS
TASK SCHEDULING FOR PARALLEL SYSTEMS Oliver Sinnen Department of Electrical and Computer Engineering The University of Aukland New Zealand TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL
More informationHASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING
HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING Alan G. Konheim JOHN WILEY & SONS, INC., PUBLICATION HASHING IN COMPUTER SCIENCE HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING
More informationDIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING
DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING ORDINARY DIFFERENTIAL EQUATION APPLICATIONS WITH R William E. Schiesser
More informationCOMPONENT-ORIENTED PROGRAMMING
COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING ANDY JU AN WANG KAI QIAN Southern Polytechnic State University Marietta, Georgia A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2005 by John
More informationModern Experimental Design
Modern Experimental Design THOMAS P. RYAN Acworth, GA Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Copyright C 2007 by John Wiley & Sons, Inc. All rights reserved.
More informationAlgorithms and Parallel Computing
Algorithms and Parallel Computing Algorithms and Parallel Computing Fayez Gebali University of Victoria, Victoria, BC A John Wiley & Sons, Inc., Publication Copyright 2011 by John Wiley & Sons, Inc. All
More informationMicroprocessor Theory
Microprocessor Theory and Applications with 68000/68020 and Pentium M. RAFIQUZZAMAN, Ph.D. Professor California State Polytechnic University Pomona, California and President Rafi Systems, Inc. WILEY A
More informationMODERN MULTITHREADING
MODERN MULTITHREADING Implementing, Testing, and Debugging Multithreaded Java and C++/Pthreads/Win32 Programs RICHARD H. CARVER KUO-CHUNG TAI A JOHN WILEY & SONS, INC., PUBLICATION MODERN MULTITHREADING
More informationWIRELESS SENSOR NETWORKS A Networking Perspective Edited by Jun Zheng Abbas Jamalipour A JOHN WILEY & SONS, INC., PUBLICATION WIRELESS SENSOR NETWORKS IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE
More informationAgile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler
Agile Database Techniques Effective Strategies for the Agile Software Developer Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Agile Database Techniques
More information7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak
Take control of Windows 7 Unlock hidden settings Rev up your network Disable features you hate, for good Fine-tune User Account control Turbocharge online speed Master the taskbar and start button Customize
More informationPractical Database Programming with Visual Basic.NET
Practical Database Programming with Visual Basic.NET IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE Press Editorial Board Lajos Hanzo, Editor in Chief R. Abari M. El-Hawary S. Nahavandi J. Anderson
More informationImplementing Security and Tokens: Current Standards, Tools, and Practices
Implementing Email Security and Tokens: Current Standards, Tools, and Practices Sean Turner Russ Housley Wiley Publishing, Inc. Implementing Email Security and Tokens: Current Standards, Tools, and Practices
More informationLinux Command Line and Shell Scripting Bible. Third Edtion
Linux Command Line and Shell Scripting Bible Third Edtion Linux Command Line and Shell Scripting BIBLE Third Edition Richard Blum Christine Bresnahan Linux Command Line and Shell Scripting Bible, Third
More informationOVER 750 QUESTIONS AND 55 TASK-BASED SIMULATIONS! CPA EXAM REVIEW. Auditing and Attestation. O. Ray Whittington, CPA, PhD Patrick R.
OVER 750 QUESTIONS AND 55 TASK-BASED SIMULATIONS! 2012 CPA EXAM REVIEW Auditing and Attestation O. Ray Whittington, CPA, PhD Patrick R. Delaney, CPA, PhD WILEY CPA EXAM REVIEW WILEY EXAM REVIEW Auditing
More informationStudy Guide. Robert Schmidt Dane Charlton
Study Guide Study Guide Robert Schmidt Dane Charlton Senior Acquisitions Editor: Kenyon Brown Development Editor: Candace English Technical Editors: Eric Biller and Brian Atkinson Production Editor: Christine
More informationExploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz
MOBILE CLOUDS Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz MOBILE CLOUDS MOBILE CLOUDS EXPLOITING DISTRIBUTED RESOURCES IN WIRELESS,
More informationMCITP Windows Server 2008 Server Administrator Study Guide
MCITP Windows Server 2008 Server Administrator Study Guide Darril Gibson MCITP Windows Server 2008 Server Administrator Study Guide MCITP Windows Server 2008 Server Administrator Study Guide Darril Gibson
More informationCloud Phone Systems. Andrew Moore. Making Everything Easier! Nextiva Special Edition. Learn:
Making Everything Easier! Nextiva Special Edition Cloud Phone Systems Learn: What cloud phone systems are and how they can benefit your company About the many advantages a cloud phone system offers Features
More informationMastering UNIX Shell Scripting
Mastering UNIX Shell Scripting Bash, Bourne, and Korn Shell Scripting for Programmers, System Administrators, and UNIX Gurus Second Edition Randal K. Michael Wiley Publishing, Inc. Mastering UNIX Shell
More informationLinux Command Line and Shell Scripting Bible
Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing, Inc. Linux Command Line and Shell Scripting Bible Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing,
More informationBeginning Web Programming with HTML, XHTML, and CSS. Second Edition. Jon Duckett
Beginning Web Programming with HTML, XHTML, and CSS Second Edition Jon Duckett Beginning Web Programming with HTML, XHTML, and CSS Introduction............................................... xxiii Chapter
More informationNetworking. 11th Edition. by Doug Lowe
Networking 11th Edition by Doug Lowe Networking For Dummies, 11th Edition Published by: John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, www.wiley.com Copyright 2016 by John Wiley & Sons,
More informationProfessional ASP.NET 2.0 Databases. Thiru Thangarathinam
Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Published by Wiley
More informationDesigning Security Architecture Solutions Jay Ramachandran Wiley Computer Publishing John Wiley & Sons, Inc. Designing Security Architecture Solutions Designing Security Architecture Solutions Jay Ramachandran
More informationJoin the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle
Join the discussion @ p2p.wrox.com Wrox Programmer to Programmer Beginning PHP 5.3 Matt Doyle Programmer to Programmer Get more out of WROX.com Interact Take an active role online by participating in our
More informationHands-On Oracle Application Express Security
Hands-On Oracle Application Express Security BUILDING SECURE APEX APPLICATIONS Recx Hands-On Oracle Application Express Security: Building Secure Apex Applications Published by John Wiley & Sons, Inc.
More informationBeginning Transact-SQL with SQL Server 2000 and Paul Turley with Dan Wood
Beginning Transact-SQL with SQL Server 2000 and 2005 Paul Turley with Dan Wood Beginning Transact-SQL with SQL Server 2000 and 2005 Beginning Transact-SQL with SQL Server 2000 and 2005 Paul Turley with
More informationIntroduction and Statement of the Problem
Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network
More informationOracle PL/SQL. DUMmIES. by Michael Rosenblum and Dr. Paul Dorsey FOR
Oracle PL/SQL FOR DUMmIES by Michael Rosenblum and Dr. Paul Dorsey Oracle PL/SQL For Dummies Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright 2006 by
More informationSecurity in Mobile Ad-hoc Networks. Wormhole Attacks
Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.
More informationSecuring SCADA Systems. Ronald L. Krutz
Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis,
More informationPCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1
PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman
More informationThe Internet of Things
The Internet of Things The Internet of Things Connecting Objects to the Web Edited by Hakima Chaouchi First published 2010 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.
More informationCSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague
Brmlab, hackerspace Prague Lightning talks, November 2016 in general in general WTF is an? in general WTF is an? Computer Security in general WTF is an? Computer Security Incident Response in general WTF
More informationJ2EE TM Best Practices Java TM Design Patterns, Automation, and Performance
J2EE TM Best Practices Java TM Design Patterns, Automation, and Performance Darren Broemmer Wiley Publishing, Inc. Dear Valued Customer, The WILEY advantage We realize you re a busy professional with
More informationxiii A. Hayden Lindsey IBM Distinguished Engineer and Director, Studio Tools Foreword
Foreword Business applications are increasingly leveraging Web technologies. Naturally this is true for Internet applications, but it is also true for intranet and extranet applications applications that
More informationWireless Networks. Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada
Wireless Networks Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada More information about this series at http://www.springer.com/series/14180 Sachin Shetty Xuebiao Yuchi
More informationiwork DUMmIES 2ND EDITION FOR
iwork FOR DUMmIES 2ND EDITION iwork FOR DUMmIES 2ND EDITION by Jesse Feiler iwork For Dummies, 2nd Edition Published by John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright
More informationWireless Sensor and Actuator Networks Algorithms and Protocols for Scalable Coordination and Data Communication Edited by Amiya Nayak and Ivan Stojmenovic A JOHN WILEY & SONS, INC., PUBLICATION Wireless
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #11 Routing and Forwarding Security 2015 Patrick Tague 1 Class #11 Basics of routing in ad hoc networks Control-plane attacks and defenses Data-plane
More informationCOMPUTING FOR NUMERICAL METHODS USING VISUAL C++
COMPUTING FOR NUMERICAL METHODS USING VISUAL C++ COMPUTING FOR NUMERICAL METHODS USING VISUAL C++ Shaharuddin Salleh Universiti Teknologi Malaysia Skudai, Johor, Malaysia Albert Y. Zomaya University of
More informationSecurity Issues In Mobile Ad hoc Network Routing Protocols
Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be
More informationMobile Ad Hoc Networks: Basic Concepts and Research Issues
Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full
More informationINTRUSION DETECTION AND CORRELATION. Challenges and Solutions
INTRUSION DETECTION AND CORRELATION Challenges and Solutions Advances in Information Security Sushil Jajodia Consulting editor Center for Secure Information Systems George Mason University Fairfax, VA
More informationBUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology
BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology ebook BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS
More informationCOMPUTATIONAL DYNAMICS
COMPUTATIONAL DYNAMICS THIRD EDITION AHMED A. SHABANA Richard and Loan Hill Professor of Engineering University of Illinois at Chicago A John Wiley and Sons, Ltd., Publication COMPUTATIONAL DYNAMICS COMPUTATIONAL
More informationXerox FreeFlow Print Server. Security White Paper. Secure solutions. for you and your customers
Xerox FreeFlow Print Server Security White Paper Secure solutions for you and your customers Executive Summary Why is security more important than ever? New government regulations have been implemented
More informationWORKSHARE SECURITY OVERVIEW
WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625
More informationPHP & MySQL. Learn to: Janet Valade. Making Everything Easier! 4th Edition. Create well-formed PHP code that s compliant with PHP 4, 5, and 6
Making Everything Easier! 4th Edition PHP & MySQL Learn to: Create well-formed PHP code that s compliant with PHP 4, 5, and 6 Easily install and set up PHP and MySQL using XAMPP Choose a Web host and secure
More informationAn Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)
An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University
More informationResearch on Industrial Security Theory
Research on Industrial Security Theory Menggang Li Research on Industrial Security Theory Menggang Li China Centre for Industrial Security Research Beijing, People s Republic of China ISBN 978-3-642-36951-3
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationSTRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government
ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents
More informationStandard Course Outline IS 656 Information Systems Security and Assurance
Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:
More informationTHE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES
THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES TABLE OF CONTENTS 3 Introduction 4 Survey Findings 4 Recent Breaches Span a Broad Spectrum 4 Site Downtime and Enterprise
More informationWindows. 7 Desktop Support and Administration. Real World Skills for MCITP Certification and Beyond. Darril Gibson
Windows 7 Desktop Support and Administration Real World Skills for MCITP Certification and Beyond Darril Gibson Acquisitions Editor: Jeff Kellum Development Editor: Gary Schwartz Technical Editors: Troy
More informationIP Application Accelerator
Akamai Solution IP Application Accelerator Improve the Performance and Reliability of any IP-Enabled Application Superior Performance Levels for AppRiver AppRiver Website AppRiver, a software-as-a-service
More informationMobile Phone Security and Forensics
Mobile Phone Security and Forensics Iosif I. Androulidakis Mobile Phone Security and Forensics A Practical Approach Second Edition Iosif I. Androulidakis Pedini Ioannina Greece ISBN 978-3-319-29741-5
More informationInternet of Things Toolkit for Small and Medium Businesses
Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors
More informationMulti-Core Programming
Multi-Core Programming Increasing Performance through Software Multi-threading Shameem Akhter Jason Roberts Intel PRESS Copyright 2006 Intel Corporation. All rights reserved. ISBN 0-9764832-4-6 No part
More informationControl Systems Cyber Security Awareness
Control Systems Cyber Security Awareness US-CERT Informational Focus Paper July 7, 2005 Produced by: I. Purpose Focus Paper Control Systems Cyber Security Awareness The Department of Homeland Security
More informationNGN: Carriers and Vendors Must Take Security Seriously
Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place
More informationTRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING
TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING In 2014, West Midlands Police (WMP) committed to a striking transformation programme that would help the force meet current and future policing
More informationTHE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING
FOURTH EDITION THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING AN INFORMATION TECHNOLOGY APPROACH Irv Englander Bentley University John Wiley & Sons, Inc. Vice President & Executive
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationHardware/Software Specifications for Ebix-Hosted Systems
Hardware/Software Specifications for Ebix-Hosted Systems EBIX, INC. 1 Ebix Way, Johns Creek, GA 30097 Rev. 06/2016 2016 Ebix, Inc. and its subsidiaries. All Rights Reserved. This software and documentation
More informationMagical Math G ROOVY G EOMETRY. Games and Activities That Make Math Easy and Fun. Lynette Long. John Wiley & Sons, Inc.
Magical Math G ROOVY G EOMETRY Games and Activities That Make Math Easy and Fun Lynette Long John Wiley & Sons, Inc. G ROOVY G EOMETRY Also in the Magical Math series Dazzling Division Delightful Decimals
More informationDenial of Service Attacks
Denial of Service Attacks CERT Division http://www.sei.cmu.edu REV-03.18.2016.0 Copyright 2017 Carnegie Mellon University. All Rights Reserved. This material is based upon work funded and supported by
More informationSYNERGISTIC WARFARE COMMUNICATION SOLUTIONS
SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS Tactical Communications & Networking Wireless / wired networks Full spectrum of tactical communications Tactical datalinks Radio ancillaries and accessories
More informationFundamentals of Operating Systems. Fifth Edition
Fundamentals of Operating Systems Fifth Edition Fundamentals of Operating Systems A.M. Lister University of Queensland R. D. Eager University of Kent at Canterbury Fifth Edition Springer Science+Business
More informationTrusted Computing Group
Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing
More informationMERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS
MERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS Introduction This document sets forth the terms and conditions ("Terms and Conditions") governing your use of the MeridianHealth.com Web site ("Web Site")
More informationThe Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationWHITE PAPER. Good Mobile Intranet Technical Overview
WHITE PAPER Good Mobile Intranet CONTENTS 1 Introduction 4 Security Infrastructure 6 Push 7 Transformations 8 Differential Data 8 Good Mobile Intranet Server Management Introduction Good Mobile Intranet
More informationSpringerBriefs in Computer Science
SpringerBriefs in Computer Science Series Editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi C. Jain David Padua Xuemin (Sherman) Shen Borko Furht V.S. Subrahmanian Martial Hebert
More informationBrink s Modern Internal Auditing. Eighth Edition
Brink s Modern Internal Auditing Eighth Edition The Wiley Corporate F&A series provides information, tools, and insights to corporate professionals responsible for issues affecting the profitability of
More informationLinux. The book you need to succeed! Boot up to Ubuntu, Fedora, KNOPPIX, Debian, opensuse, and 13 Other Distributions Edition.
DVD and CD-ROM Included Run or install 18 different Linux distributions from the multi-boot DVD and CD-ROM! Christopher Negus Linux 2009 Edition Boot up to Ubuntu, Fedora, KNOPPIX, Debian, opensuse, and
More informationSkybox Security Vulnerability Management Survey 2012
Skybox Security Vulnerability Management Survey 2012 Notice: This document contains a summary of the responses to a June 2012 survey of 100 medium to large enterprise organizations about their Vulnerability
More informationDigital Renewable Ecosystem on Predix Platform from GE Renewable Energy
Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy Business Challenges Investment in the Industrial Internet of Things (IIoT) is expected to top $60 trillion during the next 15 years.
More informationAd Hoc Networks: Issues and Routing
Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationNext Generation Networks Perspectives and Potentials. Dr Jingming Li Salina LiSalina Consulting, Switzerland Pascal Salina Swisscom SA, Switzerland
Next Generation Networks Perspectives and Potentials Dr Jingming Li Salina LiSalina Consulting, Switzerland Pascal Salina Swisscom SA, Switzerland Next Generation Networks Next Generation Networks Perspectives
More informationQuickBooks Online Security White Paper July 2017
QuickBooks Online Security White Paper July 2017 Page 1 of 6 Introduction At Intuit QuickBooks Online (QBO), we consider the security of your information as well as your customers and employees data a
More informationFundamentals of. Mobile Computing. Second Edition. Prasant Kumar Pattnaik Rajib Mall
Fundamentals of Mobile Computing Second Edition Prasant Kumar Pattnaik Rajib Mall FUNDAMENTALS OF MOBILE COMPUTING SECOND EDITION PRASANT KUMAR PATTNAIK Professor School of Computer Engineering KIIT University
More informationFUZZY LOGIC WITH ENGINEERING APPLICATIONS
FUZZY LOGIC WITH ENGINEERING APPLICATIONS Third Edition Timothy J. Ross University of New Mexico, USA A John Wiley and Sons, Ltd., Publication FUZZY LOGIC WITH ENGINEERING APPLICATIONS Third Edition FUZZY
More informationNETWORKING 3.0. Network Only Provably Cryptographically Identifiable Devices INSTANT OVERLAY NETWORKING. Remarkably Simple
NETWORKING 3.0 Network Only Provably Cryptographically Identifiable Devices INSTANT OVERLAY NETWORKING Highly Available Remarkably Simple Radically Secure IP complexity is holding your business back As
More informationCIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On )
Course Outline 12 Oct 2018 ( Add-On ) Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant
More informationOracle Exadata Statement of Direction NOVEMBER 2017
Oracle Exadata Statement of Direction NOVEMBER 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationWireless Network Security Fundamentals and Technologies
Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology
More informationMOBILITY MODELS FOR NEXT WIRELESS NETWORKS GENERATION WILEY AD HOC, VEHICULAR AND MESH NETWORKS. Paolo Santi
MOBILITY MODELS FOR NEXT GENERATION WIRELESS NETWORKS AD HOC, VEHICULAR AND MESH NETWORKS Paolo Santi Istituto di Informatica e Telematica del CNR, Italy WILEY A John Wiley & Sons, Ltd., Publication Contents
More informationContinuous protection to reduce risk and maintain production availability
Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading
More informationHOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS
HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network
More information