Ad hoc and sensor networks continue to have a growing impact
on communication. These cost-effective wireless networks provide
location independent computing in environments ranging from
military battlefields to in-home patient monitoring systems. However,
having real-time connectivity to critical information over an open
communication channel requires that the issue of security be addressed.
The unconstrained nature of a wireless medium allows for interception,
injection, and interference of communication. Moreover, in the absence
of centralized infrastructure, nodes must rely on the cooperation of their
neighbors to provide data for local processing and to route their
processed data. Malfunctions or malicious behavior in ad hoc and sensor
networks can cause erroneous results, false alarms, and unaccounted
events, crippling the effectiveness of the network. Security solutions for
ad hoc and sensor networks are necessary and must be particularly
efficient to cope with the constrained resources of these wireless
networks.
Security issues in ad-hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas.