TY - BOOK AU - Zheng,Jun AU - Hu,Honglin TI - Security in wireless mesh networks T2 - Wireless networks and mobile communications SN - 9780849382505 (alk. paper) U1 - 005.8 22 PY - 2009/// CY - Boca Raton, FL PB - CRC Press KW - Wireless communication systems KW - Security measures KW - Computer networks KW - Routers (Computer networks) N1 - "An Auerbach book."; INTRODUCTION. An Introduction to Wireless Mesh Networks. Mesh Networking in Wireless PANs, LANs, MANs, and WANs. SECURITY PROTOCOLS AND TECHNIQUES. Attacks and Security Mechanisms. Intrusion Detection in Wireless Mesh Networks. Secure Routing in Wireless Mesh Networks. Hop Integrity in Wireless Mesh Networks. Privacy Preservation in Wireless Mesh Networks. Providing Authentication, Trust, and Privacy in Wireless Mesh Networks. Non-Interactive Key Establishment in Wireless Mesh Networks. Key Management in Wireless Mesh Networks. SECURITY STANDARDS, APPLICATIONS, AND ENABLING TECHNOLOGIES. Security in Wireless PAN Mesh Networks. Security in Wireless LAN Mesh Networks. Security in IEEE 802.15.4 Cluster-Based Networks. Security in Wireless Sensor Networks. Key Management in Wireless Sensor Networks. Index ER -