首页 > 最新文献

International Journal of Computer Science and Network Security最新文献

英文 中文
Index 指数
Pub Date : 2020-02-28 DOI: 10.1002/9781119706762.index
{"title":"Index","authors":"","doi":"10.1002/9781119706762.index","DOIUrl":"https://doi.org/10.1002/9781119706762.index","url":null,"abstract":"","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79510305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Access Using AAA 使用AAA保护访问
Pub Date : 2020-02-28 DOI: 10.1002/9781119706762.ch4
{"title":"Securing Access Using AAA","authors":"","doi":"10.1002/9781119706762.ch4","DOIUrl":"https://doi.org/10.1002/9781119706762.ch4","url":null,"abstract":"","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85182063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Network Devices 保护网络设备
Pub Date : 2020-02-28 DOI: 10.1002/9781119706762.ch2
{"title":"Securing Network Devices","authors":"","doi":"10.1002/9781119706762.ch2","DOIUrl":"https://doi.org/10.1002/9781119706762.ch2","url":null,"abstract":"","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82175070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multifactor Authentication Methods: A Framework for Their Comparison and Selection 多因素认证方法:一个比较和选择的框架
Pub Date : 2019-10-26 DOI: 10.5772/intechopen.89876
Ignacio Velásquez, Angélica Caro, Alfonso Rodríguez
There are multiple techniques for users to authenticate themselves in software applications, such as text passwords, smart cards, and biometrics. Two or more of these techniques can be combined to increase security, which is known as multifactor authentication. Systems commonly utilize authentication as part of their access control with the objective of protecting the information stored within them. However, the decision of what authentication technique to implement in a system is often taken by the software development team in charge of it. A poor decision during this step could lead to a fatal mistake in relation to security, creating the necessity for a method that systematizes this task. Thus, this book chapter presents a theoretical decision framework that tackles this issue by providing guidelines based on the evaluated application ’ s characteristics and target context. These guidelines were defined through the application of an extensive action-research methodology in collaboration with experts from a multinational software development company.
在软件应用程序中,用户可以使用多种技术进行身份验证,例如文本密码、智能卡和生物识别技术。可以将这些技术中的两种或两种以上结合起来以提高安全性,这就是所谓的多因素身份验证。系统通常利用身份验证作为访问控制的一部分,目的是保护存储在其中的信息。然而,在系统中实现何种身份验证技术的决定通常由负责该系统的软件开发团队决定。在此步骤中,错误的决策可能导致与安全性相关的致命错误,从而需要将此任务系统化的方法。因此,本章提出了一个理论决策框架,通过提供基于评估应用程序的特征和目标上下文的指导方针来解决这个问题。这些指导方针是通过与跨国软件开发公司的专家合作,应用广泛的行动研究方法来定义的。
{"title":"Multifactor Authentication Methods: A Framework for Their Comparison and Selection","authors":"Ignacio Velásquez, Angélica Caro, Alfonso Rodríguez","doi":"10.5772/intechopen.89876","DOIUrl":"https://doi.org/10.5772/intechopen.89876","url":null,"abstract":"There are multiple techniques for users to authenticate themselves in software applications, such as text passwords, smart cards, and biometrics. Two or more of these techniques can be combined to increase security, which is known as multifactor authentication. Systems commonly utilize authentication as part of their access control with the objective of protecting the information stored within them. However, the decision of what authentication technique to implement in a system is often taken by the software development team in charge of it. A poor decision during this step could lead to a fatal mistake in relation to security, creating the necessity for a method that systematizes this task. Thus, this book chapter presents a theoretical decision framework that tackles this issue by providing guidelines based on the evaluated application ’ s characteristics and target context. These guidelines were defined through the application of an extensive action-research methodology in collaboration with experts from a multinational software development company.","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82827361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security in Wireless Local Area Networks (WLANs) 无线局域网(wlan)的安全性
Pub Date : 2019-10-25 DOI: 10.5772/intechopen.89857
R. Singh, T. P. Sharma
Major research domains in the WLAN security include: access control & data frame protection, lightweight authentication and secure handoff. Access control standard like IEEE 802.11i provides flexibility in user authentication but on the other hand fell prey to Denial of Service (DoS) attacks. For Protecting the data communication between two communicating devices—three standard protocols i.e., WEP (Wired Equivalent Privacy), TKIP (Temporal Key Integrity Protocol) and AES-CCMP (Advanced Encryption Standard—Counter mode with CBC-MAC protocol) are used. Out of these, AES-CCMP protocol is secure enough and mostly used in enterprises. In WLAN environment lightweight authentication is an asset, provided it also satisfies other security properties like protecting the authentication stream or token along with securing the transmitted message. CAPWAP (Control and Provisioning of Wireless Access Points), HOKEY (Hand Over Keying) and IEEE 802.11r are major protocols for executing the secure handoff. In WLANs, handoff should not only be performed within time limits as required by the real time applications but should also be used to transfer safely the keying material for further communication. In this chapter, a comparative study of the security mechanisms under the above-mentioned research domains is provided.
无线局域网安全的主要研究领域包括:访问控制和数据帧保护、轻量级认证和安全切换。像IEEE 802.11i这样的访问控制标准为用户身份验证提供了灵活性,但另一方面也成为拒绝服务(DoS)攻击的牺牲品。为了保护两个通信设备之间的数据通信,使用了三种标准协议,即WEP(有线等效隐私),TKIP(临时密钥完整性协议)和AES-CCMP(带有CBC-MAC协议的高级加密标准计数器模式)。其中,AES-CCMP协议安全性较高,主要应用于企业。在WLAN环境中,轻量级身份验证是一种资产,前提是它还满足其他安全属性,如保护身份验证流或令牌以及保护传输的消息。CAPWAP(无线接入点控制和配置)、HOKEY(移交密钥)和IEEE 802.11r是执行安全移交的主要协议。在无线局域网中,切换不仅要在实时应用程序要求的时间限制内进行,而且还应用于安全地传输密钥材料以进行进一步通信。本章对上述研究领域下的安全机制进行了比较研究。
{"title":"Security in Wireless Local Area Networks (WLANs)","authors":"R. Singh, T. P. Sharma","doi":"10.5772/intechopen.89857","DOIUrl":"https://doi.org/10.5772/intechopen.89857","url":null,"abstract":"Major research domains in the WLAN security include: access control & data frame protection, lightweight authentication and secure handoff. Access control standard like IEEE 802.11i provides flexibility in user authentication but on the other hand fell prey to Denial of Service (DoS) attacks. For Protecting the data communication between two communicating devices—three standard protocols i.e., WEP (Wired Equivalent Privacy), TKIP (Temporal Key Integrity Protocol) and AES-CCMP (Advanced Encryption Standard—Counter mode with CBC-MAC protocol) are used. Out of these, AES-CCMP protocol is secure enough and mostly used in enterprises. In WLAN environment lightweight authentication is an asset, provided it also satisfies other security properties like protecting the authentication stream or token along with securing the transmitted message. CAPWAP (Control and Provisioning of Wireless Access Points), HOKEY (Hand Over Keying) and IEEE 802.11r are major protocols for executing the secure handoff. In WLANs, handoff should not only be performed within time limits as required by the real time applications but should also be used to transfer safely the keying material for further communication. In this chapter, a comparative study of the security mechanisms under the above-mentioned research domains is provided.","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88270498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anomaly-Based Intrusion Detection System 基于异常的入侵检测系统
Pub Date : 2019-06-11 DOI: 10.5772/INTECHOPEN.82287
V. Jyothsna, K. M. Prasad
Anomaly-based network intrusion detection plays a vital role in protecting networks against malicious activities. In recent years, data mining techniques have gained importance in addressing security issues in network. Intrusion detection systems (IDS) aim to identify intrusions with a low false alarm rate and a high detection rate. Although classification-based data mining techniques are popular, they are not effective to detect unknown attacks. Unsupervised learning methods have been given a closer look for network IDS, which are insignificant to detect dynamic intrusion activities. The recent contributions in literature focus on machine learning techniques to build anomaly-based intrusion detection systems, which extract the knowledge from training phase. Though existing intrusion detection techniques address the latest types of attacks like DoS, Probe, U2R, and R2L, reducing false alarm rate is a challenging issue. Most network IDS depend on the deployed environment. Hence, developing a system which is independent of the deployed environment with fast and appropriate feature selection method is a challenging issue. The exponential growth of zero-day attacks emphasizing the need of security mechanisms which can accurately detect previously unknown attacks is another challenging task. In this work, an attempt is made to develop generic meta-heuristic scale for both known and unknown attacks with a high detection rate and low false alarm rate by adopting efficient feature optimization techniques.
基于异常的网络入侵检测在保护网络免受恶意攻击方面起着至关重要的作用。近年来,数据挖掘技术在解决网络安全问题方面发挥了重要作用。入侵检测系统(IDS)旨在以低虚警率和高检测率识别入侵。尽管基于分类的数据挖掘技术很受欢迎,但它们在检测未知攻击方面并不有效。无监督学习方法对网络入侵检测有更深入的研究,它对于检测动态入侵活动是微不足道的。最近在文献中的贡献集中在机器学习技术来构建基于异常的入侵检测系统,该系统从训练阶段提取知识。虽然现有的入侵检测技术可以解决最新类型的攻击,如DoS、Probe、U2R和R2L,但降低误报率是一个具有挑战性的问题。大多数网络IDS依赖于部署的环境。因此,利用快速、合适的特征选择方法开发一个独立于部署环境的系统是一个具有挑战性的问题。零日攻击的指数级增长强调了对能够准确检测先前未知攻击的安全机制的需求,这是另一个具有挑战性的任务。本文尝试采用高效的特征优化技术,为已知和未知攻击开发具有高检测率和低虚警率的通用元启发式规模。
{"title":"Anomaly-Based Intrusion Detection System","authors":"V. Jyothsna, K. M. Prasad","doi":"10.5772/INTECHOPEN.82287","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.82287","url":null,"abstract":"Anomaly-based network intrusion detection plays a vital role in protecting networks against malicious activities. In recent years, data mining techniques have gained importance in addressing security issues in network. Intrusion detection systems (IDS) aim to identify intrusions with a low false alarm rate and a high detection rate. Although classification-based data mining techniques are popular, they are not effective to detect unknown attacks. Unsupervised learning methods have been given a closer look for network IDS, which are insignificant to detect dynamic intrusion activities. The recent contributions in literature focus on machine learning techniques to build anomaly-based intrusion detection systems, which extract the knowledge from training phase. Though existing intrusion detection techniques address the latest types of attacks like DoS, Probe, U2R, and R2L, reducing false alarm rate is a challenging issue. Most network IDS depend on the deployed environment. Hence, developing a system which is independent of the deployed environment with fast and appropriate feature selection method is a challenging issue. The exponential growth of zero-day attacks emphasizing the need of security mechanisms which can accurately detect previously unknown attacks is another challenging task. In this work, an attempt is made to develop generic meta-heuristic scale for both known and unknown attacks with a high detection rate and low false alarm rate by adopting efficient feature optimization techniques.","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82094387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Hybrid Approaches to Block Cipher 分组密码的混合方法
Pub Date : 2019-05-23 DOI: 10.5772/INTECHOPEN.82272
R. Chitrakar, Roshan Bhusal, Prajwol Maharjan
This chapter introduces two new approaches to block cipher — one is DNA hybridization encryption scheme (DHES) and the other is hybrid graphical encryption algorithm (HGEA). DNA cryptography deals with the techniques of hiding messages in the form of a DNA sequence. The key size of data encryption standard (DES) can be increased by using DHES. In DHES, DNA cryptography algorithm is used for encryption and decryption, and one-time pad (OTP) scheme is used for key generation. The output of DES algorithm is passed as an input to DNA hybridization scheme to provide an added security. The second approach, HGEA, is based on graphical pattern recognition. By performing multiple transformations, shifting and logical operations, a block cipher is obtained. This algorithm is influenced by hybrid cubes encryption algorithm (HiSea). Features like graphical interpretation and computation of selected quadrant value are the unique features of HGEA. Moreover, multiple key generation scheme combined with graphical interpretation method provides an increased level of security.
介绍了分组密码的两种新方法——DNA杂交加密方案(DHES)和混合图形加密算法(HGEA)。DNA密码学研究的是以DNA序列的形式隐藏信息的技术。使用DES可以增大数据加密标准(DES)的密钥大小。在dhs中,加密和解密采用DNA加密算法,密钥生成采用一次性填充(OTP)方案。DES算法的输出作为输入传递给DNA杂交方案,以提供额外的安全性。第二种方法是基于图形模式识别的HGEA。通过多次变换、移位和逻辑运算,得到分组密码。该算法受混合立方体加密算法(HiSea)的影响。图形解释和所选象限值的计算等特征是HGEA的独特之处。此外,多密钥生成方案与图形解释方法相结合,提高了安全性。
{"title":"Hybrid Approaches to Block Cipher","authors":"R. Chitrakar, Roshan Bhusal, Prajwol Maharjan","doi":"10.5772/INTECHOPEN.82272","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.82272","url":null,"abstract":"This chapter introduces two new approaches to block cipher — one is DNA hybridization encryption scheme (DHES) and the other is hybrid graphical encryption algorithm (HGEA). DNA cryptography deals with the techniques of hiding messages in the form of a DNA sequence. The key size of data encryption standard (DES) can be increased by using DHES. In DHES, DNA cryptography algorithm is used for encryption and decryption, and one-time pad (OTP) scheme is used for key generation. The output of DES algorithm is passed as an input to DNA hybridization scheme to provide an added security. The second approach, HGEA, is based on graphical pattern recognition. By performing multiple transformations, shifting and logical operations, a block cipher is obtained. This algorithm is influenced by hybrid cubes encryption algorithm (HiSea). Features like graphical interpretation and computation of selected quadrant value are the unique features of HGEA. Moreover, multiple key generation scheme combined with graphical interpretation method provides an increased level of security.","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"95 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83696260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Cross-Layer FPGA-Based Security Scheme for Wireless Networks 一种新的跨层fpga无线网络安全方案
Pub Date : 2018-12-11 DOI: 10.5772/INTECHOPEN.82390
M. E. Sone
This chapter presents a new cross-layer security scheme which deploys efficient coding techniques in the physical layer in an upper layer classical cryptographic protocol system. The rationale in designing the new scheme is to enhance security-throughput trade-off in wireless networks which is in contrast to existing schemes which either enhances security at the detriment of data throughput or vice versa. The new scheme is implemented using the residue number system (RNS), nonlinear convolutional coding and subband coding at the physical layer and RSA cryptography at the upper layers. The RNS reduces the huge data obtained from RSA cryptography into small parallel data. To increase the security level, iterated wavelet-based subband coding splits the ciphertext into different levels of decomposition. At subsequent levels of decomposition, the ciphertext from the preceding level serves as data for encryption using convolutional codes. In addition, throughput is enhanced by transmitting small parallel data and the bit error correction capability of non-linear convolutional code. It is shown that, various passive and active attacks common to wireless networks could be circumvented. An FPGA implementation applied to CDMA could fit into a single Virtex-4 FPGA due to small parallel data sizes employed.
本章提出了一种新的跨层安全方案,该方案在上层经典密码协议系统的物理层部署了高效的编码技术。设计新方案的基本原理是增强无线网络的安全性和吞吐量之间的权衡,这与现有方案相比,要么提高安全性,要么损害数据吞吐量,反之亦然。该方案在物理层采用残数系统(RNS)、非线性卷积编码和子带编码,在上层采用RSA加密技术。RNS将RSA加密获得的海量数据简化为小的并行数据。为了提高安全级别,基于迭代小波的子带编码将密文分成不同的分解级别。在后续的分解层中,前一层的密文作为使用卷积码进行加密的数据。此外,通过传输少量并行数据和非线性卷积码的纠错能力,提高了吞吐量。研究表明,无线网络中常见的各种被动和主动攻击都是可以被规避的。由于采用的并行数据量小,应用于CDMA的FPGA实现可以适合单个Virtex-4 FPGA。
{"title":"A New Cross-Layer FPGA-Based Security Scheme for Wireless Networks","authors":"M. E. Sone","doi":"10.5772/INTECHOPEN.82390","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.82390","url":null,"abstract":"This chapter presents a new cross-layer security scheme which deploys efficient coding techniques in the physical layer in an upper layer classical cryptographic protocol system. The rationale in designing the new scheme is to enhance security-throughput trade-off in wireless networks which is in contrast to existing schemes which either enhances security at the detriment of data throughput or vice versa. The new scheme is implemented using the residue number system (RNS), nonlinear convolutional coding and subband coding at the physical layer and RSA cryptography at the upper layers. The RNS reduces the huge data obtained from RSA cryptography into small parallel data. To increase the security level, iterated wavelet-based subband coding splits the ciphertext into different levels of decomposition. At subsequent levels of decomposition, the ciphertext from the preceding level serves as data for encryption using convolutional codes. In addition, throughput is enhanced by transmitting small parallel data and the bit error correction capability of non-linear convolutional code. It is shown that, various passive and active attacks common to wireless networks could be circumvented. An FPGA implementation applied to CDMA could fit into a single Virtex-4 FPGA due to small parallel data sizes employed.","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"68 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88578721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Firewall Design and Analysis 防火墙设计与分析
Pub Date : 2011-01-15 DOI: 10.1142/7229
A. Liu
{"title":"Firewall Design and Analysis","authors":"A. Liu","doi":"10.1142/7229","DOIUrl":"https://doi.org/10.1142/7229","url":null,"abstract":"","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"19 1","pages":"1-124"},"PeriodicalIF":0.0,"publicationDate":"2011-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72942781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security in Ad Hoc and Sensor Networks Ad Hoc和传感器网络中的安全性
Pub Date : 2009-09-23 DOI: 10.1142/7239
R. Beyah, J. Mcnair, C. Corbett
Security issues in ad-hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas.
自组网和传感器网络中的安全问题变得极其重要。这本编辑过的书对这些网络中的安全问题提供了全面的处理,从攻击缓解到攻击成功执行后的恢复。安全问题包括(但不限于)攻击、恶意节点检测、访问控制、身份验证、入侵检测、隐私和匿名、密钥管理、位置验证、安全架构和协议、保密性和完整性、网络弹性和生存性以及信任模型。这本完整的书为与这些领域相关的学生、研究人员和行业从业者提供了极好的参考。
{"title":"Security in Ad Hoc and Sensor Networks","authors":"R. Beyah, J. Mcnair, C. Corbett","doi":"10.1142/7239","DOIUrl":"https://doi.org/10.1142/7239","url":null,"abstract":"Security issues in ad-hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas.","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"96 1","pages":"1-420"},"PeriodicalIF":0.0,"publicationDate":"2009-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90717865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
International Journal of Computer Science and Network Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1