Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

PART II of attachment. Mobility support involves regis- tration and tracking of mobile node locations, access control to visited networks, and forward- ing mobile node traffic from home network to visited networks. Moreover, support of mobil- ity introduces new possibilities for adversaries, such as traffic hijacking and theft of network resources. The chapter goes trough security issues and solutions specific to the support of mobil- ity in wireless networks. The concepts and solu- tions are explained in the context of mobile IPv4 and v6. Chapter 6 titled "Robust Wireless Infrastruc- ture against Jamming Attacks" first presents a comprehensive overview of design principles to build robust wireless network infrastructure in adversarial settings. It then discusses complex control functions for efficient management of radio spectrum and how they are vulnerable to cross-layer attacks including jamming attacks. Security for Wireless Mobile Networks 97 vital information. Various schemes are proposed for certification authority, key management and distribution, intrusion detection, and secure rout- ing in MANETs. To keep the chapter reasonably sized, some important issues on MANET security have been omitted. One such issue is secure dynamic address allocation [8] that leads to such secu- rity threats as spoofing, exhaustion, false address conflict, and false deny message attacks. Another important issue is peer-to-peer security [9]. Addi- tionally, behavioral patterns of the insider attacks in MANETs can be captured using game theory that guides better defense strategies [10]. Finally, Chapter 8 titled "Defending against Identity-based Attacks in Wireless Networks" focuses on addressing identity-based attacks, such as spoofing and Sybil, which are consid- ered as an important first step in an adversary's attempt to launch a variety of attacks in wireless