Security issues in distributed systems and network systems are extremely important. This edited book provides a comprehensive treatment on security issues in these systems, ranging from attacks to all kinds of solutions from prevention to detection approaches. The books includes security studies in a range of systems including peer-to-peer networks, distributed systems, Internet, wireless networks, Internet service, e-commerce, mobile and pervasive computing. Security issues in these systems include attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, security architectures and protocols, security theory and tools, secrecy and integrity, and trust models. This volume provides an excellent reference for students, faculty, researchers and people in the industry related to these fields.
Sample Chapter(s)
Chapter 1: Security Issues in the TCP/IP Suite (217 KB)
Contents:
- Security in Internet:
- Security Issues in the TCP/IP Suite (P Mateti)
- New Internet Threats: An Overview of Spam Email and Spyware (M-W Wu et al.)
- Securing Multimedia and VoIP Content with the Secure Real-Time Transport Protocol (M Oehler)
- Security in Distributed Systems:
- Cover-Free Families and Their Applications (S Ling)
- Group Rekeying in Multi-Privileged Group Communications for Distributed Networking Services (G-J Wang et al.)
- Access Control Policy Negotiation for Remote Hot-Deployed Grid Services (J-P Huai et al.)
- Security in Pervasive Computing:
- Low-Cost Radio Frequency Identification Security (Y Xiao et al.)
- Energy Consumption of Key Distribution in 802.15.4 Beacon Enabled Cluster with Sleep Management (J Misic)
- Securing Wireless Networks Using Device Type Identification (C Corbett et al.)
- Security in Sensor Networks:
- Security in Distributed Sensor Network Time Synchronization Services (F Hu et al.)
- Key Management in Wireless Sensor Networks (Y-K Kwok)
- Secure Network Programming in Wireless Sensor Networks (T Dimitriou & I Krontiris)
- Security in Ad Hoc Networks:
- Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes (K Hoeper & G Gong)
- Hash–Binary–Tree Based Group Key Distribution with Time-Limited Node Revocation (Y-X Jiang et al.)
- Efficient Authentication Schemes for AODV and DSR (S-D Xu et al.)
- Security in Wireless Networks:
- Security in Wireless Local Area Networks (M O Pervaiz et al.)
- Access Security in Heterogeneous Wireless Networks (A A Shidhani & V C M Leung)
- Authentication in Wireless Cellular Networks (F H Li et al.)
Readership: Researchers and professional in network and distributed systems.