Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications by Wenye Wang, Cliff Wang, Zhou Lu, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Wenye Wang, Cliff Wang, Zhou Lu ISBN: 9783319232881
Publisher: Springer International Publishing Publication: November 5, 2015
Imprint: Springer Language: English
Author: Wenye Wang, Cliff Wang, Zhou Lu
ISBN: 9783319232881
Publisher: Springer International Publishing
Publication: November 5, 2015
Imprint: Springer
Language: English

This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance metric to quantify the benefits of backoff misbehavior and show the impacts of a wide range of backoff mishandling nodes on the network performance, and propose a scheme to minimize the delay of time-critical message delivery under jamming attacks in smart grid applications. An investigation on the resilience of mobile services against malware attacks is included to advance understanding of network vulnerabilities associated with emerging wireless networks and offers instrumental guidance into the security design for future wireless and mobile applications. This book is appropriate for students, faculty, engineers, and experts in the technical area of wireless communication, mobile networks and cyber security.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance metric to quantify the benefits of backoff misbehavior and show the impacts of a wide range of backoff mishandling nodes on the network performance, and propose a scheme to minimize the delay of time-critical message delivery under jamming attacks in smart grid applications. An investigation on the resilience of mobile services against malware attacks is included to advance understanding of network vulnerabilities associated with emerging wireless networks and offers instrumental guidance into the security design for future wireless and mobile applications. This book is appropriate for students, faculty, engineers, and experts in the technical area of wireless communication, mobile networks and cyber security.

More books from Springer International Publishing

Cover of the book Automotive NVH Technology by Wenye Wang, Cliff Wang, Zhou Lu
Cover of the book Heterogeneous Reconfigurable Processors for Real-Time Baseband Processing by Wenye Wang, Cliff Wang, Zhou Lu
Cover of the book Handbook of Nutraceuticals for Clinical Use by Wenye Wang, Cliff Wang, Zhou Lu
Cover of the book Spectral Theory and Applications of Linear Operators and Block Operator Matrices by Wenye Wang, Cliff Wang, Zhou Lu
Cover of the book Therapeutic rTMS in Neurology by Wenye Wang, Cliff Wang, Zhou Lu
Cover of the book Electrical Design of a 400 kV Composite Tower by Wenye Wang, Cliff Wang, Zhou Lu
Cover of the book The Skadar/Shkodra Lake Environment by Wenye Wang, Cliff Wang, Zhou Lu
Cover of the book The Problem of Catalan by Wenye Wang, Cliff Wang, Zhou Lu
Cover of the book Learning Technology for Education Challenges by Wenye Wang, Cliff Wang, Zhou Lu
Cover of the book Computer Aided Verification by Wenye Wang, Cliff Wang, Zhou Lu
Cover of the book Proceedings of the International Conference on Information Technology & Systems (ICITS 2018) by Wenye Wang, Cliff Wang, Zhou Lu
Cover of the book Thinking Ahead - Essays on Big Data, Digital Revolution, and Participatory Market Society by Wenye Wang, Cliff Wang, Zhou Lu
Cover of the book Automated Workflow Scheduling in Self-Adaptive Clouds by Wenye Wang, Cliff Wang, Zhou Lu
Cover of the book Applied Computer Sciences in Engineering by Wenye Wang, Cliff Wang, Zhou Lu
Cover of the book Bad Governance and Corruption by Wenye Wang, Cliff Wang, Zhou Lu
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy