Securing Emerging Wireless Systems : Lower-layer Approaches /

Bibliographic Details
Main Authors: Chen, Yingying. (Author), Xu, Wenyuan. (Author), Trappe, Wade. (Author), Zhang, YanYong. (Author)
Corporate Author: SpringerLink (Online service)
Format: eBook
Language:English
Published: New York, NY : Springer US : Imprint: Springer, 2009.
Edition:1st ed. 2009.
Subjects:
Table of Contents:
  • Secure Localization
  • Overview of Wireless Localization
  • On the Robustness of Localization Algorithms to Signal Strength Attacks
  • Attack Detection in Wireless Localization
  • Robust Statistical Methods for Attack-tolerant Localization
  • Spatio-Temporal Access Control by Dual-using Sensor Networks
  • Defending Against Wireless Spoofing Attacks
  • Relationship-based Detection of Spoofing-related Anomalous Traffic
  • Detecting and Localizing Wireless Spoofing Attacks
  • Defending Against Radio Interference
  • A Brief Survey of Jamming and Defense Strategies
  • Jamming Attacks and Radio Interference
  • Detecting Jamming Attacks and Radio Interference
  • Channel Surfing: Defending Wireless Networks against Radio Interference
  • Preserving Privacy in Wireless Networks
  • Enhancing Source-Location Privacy in Sensor Network Routing
  • Temporal Privacy in Wireless Networks
  • Securing Wireless Systems via Lower Layer Enforcements
  • Concluding Remarks.