Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Books and Book parts
  4. Security and Cooperation in Wireless Networks
 
book/monograph

Security and Cooperation in Wireless Networks

Buttyan, Levente  
•
Hubaux, Jean-Pierre  
2008

According to most technology pundits, progress in wireless and sensor networks will lead us into a world of ubiquitous computing, in which myriads of tiny, untethered sensors and actuators will communicate with each other. Information technology will thus deliver its most encompassing and pervasive accomplishment to mankind, promptly taking care of the needs and wishes of everyone. Or maybe not. The described evolution is driven primarily by market forces and vastly ignores the users’ intentions. Yet the recent history of the Internet has shown that these intentions can have devastating effects; for example, spam, viruses, “phishing” and denial of service attacks have unfortunately become commonplace. The misbehavior of a relatively small number of users is leading to a substantial inconvenience to the whole community. Similar or even worse misdeeds are and will be perpetrated in wireless networks. This textbook aims at avoiding that ubiquitous computing becomes a pervasive nightmare. It addresses the following fundamental questions: • How are users and devices identified? • How can a security association be established between two wireless peers? • How can packets be securely and cooperatively routed in a multi-hop network? • How can the fair share of bandwidth between nodes located in the same radio domain be guaranteed? • How do wireless operators behave, if they have to share a given chunk of the spectrum? • How can naturally selfish players be encouraged to behave cooperatively? • And, above all, how is privacy protected? The book treats each of these questions from a theoretical point of view and illustrates them by means of concrete examples such as mesh, ad hoc, vehicular, sensor, and RFID networks.

  • Details
  • Metrics
Type
book/monograph
ISBN

9780521873710

Author(s)
Buttyan, Levente  
Hubaux, Jean-Pierre  
Date Issued

2008

Publisher

Cambridge University Press

Publisher place

Cambridge

Subjects

Wireless networks

•

Security

•

Non-cooperative behavior

•

Cooperation

•

Game theory

•

Incentives

•

Privacy

•

Vehicular networks

•

Sensor networks

•

Mesh networks

•

RFID

•

Ad hoc networks

•

Community networks

•

WiFi

URL

URL

http://secowinet.epfl.ch
Written at

EPFL

EPFL units
LCA  
LDS  
Available on Infoscience
December 15, 2006
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/238564
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés