This text is suitable for advanced undergraduates and graduate students of electrical engineering and computer science, and researchers and practitioners in the wireless industry.
Lecture slides and instructor-only solutions available online.
1. The security of existing wireless networks
2. Upcoming wireless networks and new challenges
3. Trust assumptions and adversary models
Part II. Thwarting Malicious Behavior:
4. Naming and addressing
5. Establishment of security associations
6. Securing neighbor discovery
7. Secure routing in multi-hop wireless networks
8. Privacy protection
Part III. Thwarting Selfish Behavior:
9. Selfish behavior at the MAC layer of CSMA/CA
10. Selfishness in packet forwarding
11. Wireless operators in a shared spectrum
12. Secure protocols for behavior enforcement
A. Introduction to cryptographic algorithms and protocols
B. A tutorial on game theory for wireless networks
Levente Buttyán is an Associate Professor at the Department of Telecommunications, Budapest University of Technology and Economics (BME), Hungary.
Jean-Pierre Hubaux is a Professor at the School of Computer and Communication Sciences, Ecole Polytechnique Fédérale de Lausanne (EPFL), Switzerland.