This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.The design was coded using Verilog HDL and synthesized using Synopsys FPGA Compiler II. Xilinxa#39; Foundation ... The design was connected to an AHB slave interface which made it directly accessible by the ARM7 core. Stimulated by compiled C-code, the core read from and wrote to the prototype. The Integrator/ APa#39;sanbsp;...
|Title||:||Wireless Network Security|
|Author||:||Yang Xiao, Xuemin (Sherman) Shen, Ding-Zhu Du|
|Publisher||:||Springer Science & Business Media - 2007-12-29|