18.02.2014 Views

wireless ad hoc networking

wireless ad hoc networking

wireless ad hoc networking

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Index 633<br />

structure, 270<br />

multiple regression, 269<br />

Ideal routing protocol, 116<br />

IEEE 802.11i security, 410–417:<br />

802.11i operational phases, 412–414<br />

802.1X authentication, 413<br />

RADIUS-based key distribution,<br />

413–414<br />

security capabilities discovery, 413<br />

data confidentiality protocols in RSN,<br />

414–417<br />

AES-CCMP, 416–417<br />

temporal key integrity protocol,<br />

415–416<br />

key hierarchy of 802.11i, 411–412<br />

temporal key integrity protocol and,<br />

419–434. See also under Temporal<br />

key integrity protocol<br />

IEEE 802.11s mesh networks, 478–480<br />

IEEE 802.11u integration with external<br />

networks, 491–492<br />

IEEE 802.15 mesh networks, 480–481<br />

IEEE 802.16 mesh networks, 481<br />

IEEE 802.21 MIH function, 490–491<br />

Independent basic service set (IBSS), 373<br />

Indicator-based scheme, in WMN, 453<br />

Integrated cellular network, security<br />

issues in, 535–566:<br />

architecture, 537–540<br />

communication and mobility,<br />

538–539<br />

multihop routing protocols, 539–540<br />

investigation and analysis of, 554–563<br />

charging and rewarding, 558–562<br />

integrated internet and MANET,<br />

562–563<br />

multihop cellular IP, 560<br />

two-hop relay, 557–558: security<br />

authentication in, 558<br />

unified cellular and <strong>ad</strong> <strong>hoc</strong> network,<br />

555–557: UCAN secure crediting,<br />

556<br />

new security issues and challenges,<br />

564–566<br />

distributed trusted relationship,<br />

564–565<br />

multihop routing security, 565<br />

potential security threats, 542–554<br />

internet connectivity attacks,<br />

543–547. See also separate entry<br />

MS mobility attacks, 547–552. See<br />

also separate entry<br />

multihop routing attacks, 552–553<br />

packet forwarding attacks, 553–554<br />

specific <strong>wireless</strong> protocol attacks,<br />

554<br />

security impacts from, 540–542<br />

internet and infrastructure support,<br />

540–541<br />

multimode with multiple r<strong>ad</strong>io<br />

interfaces, 542<br />

<strong>wireless</strong> multihop communication,<br />

541–542<br />

Integrated heterogeneous <strong>wireless</strong><br />

networks, 483–502:<br />

3GPP/WLAN interworks, 487–490. See<br />

also separate entry<br />

characteristics, 484<br />

heterogeneous<strong>wireless</strong> multihop<br />

networks, 492–499. See also<br />

separate entry<br />

IEEE 802.11u integration with external<br />

networks, 491–492<br />

IEEE 802.21 MIH function, 490–491<br />

infrastructure-based, 485–492<br />

integrated routing protocol, 497–499<br />

research issues for, 500–502<br />

Integrated routing protocol, 497–499<br />

Integrated WCDMA/ WLAN/<strong>ad</strong> <strong>hoc</strong><br />

networks, 595–621. See also under<br />

Supporting multimedia<br />

communication<br />

Integrity rule, 525<br />

Interference phenomena, 278:<br />

hidden interferences, 278<br />

Interference-free node scheduling, 76–79<br />

Internet connectivity attacks, 543–547:<br />

eavesdropping and traffic analysis,<br />

543–544<br />

internet–<strong>wireless</strong> DDoS, 545–546<br />

unauthorized internet access and<br />

attacks, 544–545<br />

<strong>wireless</strong>–internet DDoS, 546–547<br />

Interval rule, 525<br />

Interval-coloring, 289<br />

Intrusion detection system (IDS),<br />

505–530:<br />

background, 505–506<br />

cross-feature analysis for, 513–514<br />

for mobile <strong>ad</strong> <strong>hoc</strong> networks, 506–519.<br />

See also under Mobile <strong>ad</strong> <strong>hoc</strong><br />

networks requirements for,<br />

507–508 security vulnerabilities,<br />

508<br />

for <strong>wireless</strong> sensor networks, 519–530.<br />

See also separate entry<br />

game theory approach to, 515–516

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!