Security in Wireless Ad Hoc and Sensor Networks
Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and counter measures in wireless ad hoc, sensor and mesh networks, and briefly presents the standards on related topics. The authors offer a clear exposition of various challenges and solutions in this field including bootstrapping, key distribution and exchange, authentication issues, privacy, anonymity and tamper resilience.
- Introduces the fundamentals and key issues of the new technologies followed by comprehensive presentation on security attacks and counter measures
- Covers Denial of Service (DoS) attacks, hardware aspects of secure wireless ad hoc and sensor networks and secure routing
- Contains information on cryptographic primitives and electronic warfare
- Includes problems at the end of each chapter to enhance learning.
This book is well suited for graduate students in computer, electrical and communications engineering and computer science departments, researchers in academia and industry, as well as C4I engineers and officers in the military. Wireless network designers for internet service providers and mobile communications operators will also find this book very useful.
List of Acronyms.
Part One Wireless Ad Hoc, Sensor and Mesh Networking.
1.1 Information Security.
1.2 Scope of the Book.
1.3 Structure of the Book.
1.4 Electronic Resources for the Book.
1.5 Review Questions.
2 Wireless Ad Hoc, Sensor and Mesh Networks.
2.1 Ad Hoc Networks and Applications.
2.2 Sensor and Actuator Networks.
2.3 Mesh Networks.
2.4 Tactical Communications and Networks.
2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks.
.6 Review Questions.
3 The Wireless Medium.
3.1 Wireless Channel Fundamentals and Security.
3.2 Advanced Radio Technologies.
3.3 Review Questions.
4 Medium Access and Error Control.
4.1 Medium Access Control.
4.2 Error Control.
4.3 Wireless Metropolitan Area Networks.
4.4 Wireless Local Area Networks.
4.5 Wireless Personal Area Networks.
4.6 Review Questions.
5.1 Internet Protocol and Mobile IP.
5.2 Routing in Wireless Ad Hoc Networks.
5.3 Routing in Wireless Sensor and Actuator Networks.
5.4 Review Questions.
6 Reliability, Flow and Congestion Control.
6.2 Flow and Congestion Control.
6.3 Review Questions.
7 Other Challenges and Security Aspects.
7.1 Localization and Positioning.
7.2 Time Synchronization.
7.4 Data Aggregation and Fusion.
7.5 Data Querying.
7.7 Mobility Management.
7.8 Cross-layer Design.
7.9 Review Questions.
Part Two Security in Wireless Ad Hoc, Sensor and Mesh Networking.
8 Security Attacks in Ad Hoc, Sensor and Mesh Networks.
8.1 Security Attacks.
8.3 Security Goals.
8.4 Review Questions.
9.1 Symmetric Encryption.
9.2 Asymmetric Encryption.
9.3 Hash Functions and Message Authentication Code.
9.4 Cascading Hashing.
9.5 Review Questions.
10 Challenges and Solutions: Basic Issues.
10.1 Bootstrapping Security in Ad Hoc Networks.
10.2 Bootstrapping Security in Sensor Networks.
10.3 Key Distribution, Exchange and Management.
10.4 Authentication Issues.
10.6 Review Questions.
11 Challenges and Solutions: Protection.
11.1 Privacy and Anonymity.
11.2 Intrusion Detection.
11.3 Defense Against Traffic Analysis.
11.4 Access Control and Secure Human–Computer Interaction.
11.5 Software-Based Anti-Tamper Techniques.
11.6 Tamper Resilience: Hardware Protection.
11.7 Availability and Plausibility.
11.8 Review Questions.
12 Secure Routing.
12.1 Defense Against Security Attacks in Ad Hoc Routing.
12.2 Secure Ad Hoc Routing Protocols.
12.3 Further Reading.
12.4 Review Questions.
13 Specific Challenges and Solutions.
13.1 SPINS: Security Protocols for Sensor Networks.
13.2 Quarantine Region Scheme for Spam Attacks.
13.3 Secure Charging and Rewarding Scheme.
13.4 Secure Node Localization.
13.5 Secure Time Synchronization.
13.6 Secure Event and Event Boundary Detection.
13.7 Review Questions.
14 Information Operations and Electronic Warfare.
14.1 Electronic Support.
14.2 Electronic Attack.
14.3 Electronic Protection.
14.4 Review Questions.
15.1 X.800 and RFC 2828.
15.2 Wired Equivalent Privacy (WEP).
15.3 Wi-Fi Protected Access (WPA).
Chunming Rong received his bachelors, masters and PhD
degrees in Computer Science from the University of Bergen in Norway
in 1993, 1995 and 1998, respectively. In 1995–1998, he was a
research fellow at the University of Bergen. In 2001–2003, he
was a post-doctoral researcher funded by Simula Research
Laboratory. Currently, he is a Professor and chair of the computer
science section at the University of Stavanger. He has also served
as an adjunct Professor at the University Graduate Centre,
University of Oslo, since 2005. Professor Rong was given the
ConocoPhilips Communication Award (Norway) in 2007. His paper
‘New Infinite Families of 3-Designs from Preparata Codes
over Z4’ was awarded Editor’s Choice in
Discrete Mathematics in 1999. He is an associate editor of
the International Journal of Computer Science & Applications
(IJCSA) and served on the editorial board of the
International Journal of Mobile Communications (IJMC)
between 2003 and 2006. For the IEEE International Symposium on
Security in Networks and Distributed Systems (SSNDS), he was
program chair in 2007 in Canada and general chair in 2008. For the
International Conference on Autonomic and Trusted Computing (ATC),
he was award chair in 2007 in Hong Kong and general chair in 2008
in Norway. For the International Conference on Ubiquitous
Intelligence and Computing (UIC), he was general chair in 2008 in
Norway. Professor Rong was chairman of the board of the Foundation
of the Norwegian Computer Science Conference (NIK) from
2005–2007, a board member of the Norwegian Information
Security Network (NISNet) from 2007–2011 and a member of the
Norwegian Informatics Council (Nasjonalt fagråd for
informatikk). He has also been a member of the board for the
‘ICT Security and Vulnerability (IKT-SoS)’ program at
the Research Council of Norway. He also currently serves in the
workgroup for Information Security in Integrated Operation at the
Norwegian Oil Industry Association (OLF). As project manager, he
has received grants from the Research Council of Norway for the
projects ‘Integration of Data Processing in Oil and Gas
Drilling and Completion’ for 2008–2010, ‘Secure
and Reliable Wireless and Ad Hoc Communications (SWACOM)’ for
2006–2009 and ‘Integrated IP-based Services for Smart
Home Environment (IS-Home)’ for 2007–2010. The
Norwegian Information Security Network (NISNet) also receives
annual funding from the Research Council of Norway. His research
interests include computer and network security, wireless
communications, cryptography, identity management, electronic
payment, coding theory and semantic web technology.