Securing Emerging Wireless Systems : Lower-layer Approaches /
Main Authors: | , , , |
---|---|
Corporate Author: | |
Format: | eBook |
Language: | English |
Published: |
New York, NY :
Springer US : Imprint: Springer,
2009.
|
Edition: | 1st ed. 2009. |
Subjects: |
Table of Contents:
- Secure Localization
- Overview of Wireless Localization
- On the Robustness of Localization Algorithms to Signal Strength Attacks
- Attack Detection in Wireless Localization
- Robust Statistical Methods for Attack-tolerant Localization
- Spatio-Temporal Access Control by Dual-using Sensor Networks
- Defending Against Wireless Spoofing Attacks
- Relationship-based Detection of Spoofing-related Anomalous Traffic
- Detecting and Localizing Wireless Spoofing Attacks
- Defending Against Radio Interference
- A Brief Survey of Jamming and Defense Strategies
- Jamming Attacks and Radio Interference
- Detecting Jamming Attacks and Radio Interference
- Channel Surfing: Defending Wireless Networks against Radio Interference
- Preserving Privacy in Wireless Networks
- Enhancing Source-Location Privacy in Sensor Network Routing
- Temporal Privacy in Wireless Networks
- Securing Wireless Systems via Lower Layer Enforcements
- Concluding Remarks.