Home Page Icon
Home Page
Table of Contents for
Wireless Communication Security
Close
Wireless Communication Security
by Manju Khari, Manisha Bharti, M. Niranjanamurthy
Wireless Communication Security
Cover
Series Page
Title Page
Copyright Page
Preface
1 M2M in 5G Cellular Networks: Challenges, Proposed Solutions, and Future Directions
2 MAC Layer Protocol for Wireless Security
3 Enhanced Image Security Through Hybrid Approach: Protect Your Copyright Over Digital Images
4 Quantum Computing
5 Feature Engineering for Flow-Based IDS
6 Environmental Aware Thermal (EAT) Routing Protocol for Wireless Sensor Networks
7 A Comprehensive Study of Intrusion Detection and Prevention Systems
8 Hardware Devices Integration With IoT
9 Depth Analysis On DoS & DDoS Attacks
10 SQL Injection Attack on Database System
11 Machine Learning Techniques for Face Authentication System for Security Purposes
12 Estimation of Computation Time for Software-Defined Networking‑Based Data Traffic Offloading System in Heterogeneous Network
About the Editors
Index
Also of Interest
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Cover
Next
Next Chapter
Series Page
Table of Contents
Cover
Series Page
Title Page
Copyright Page
Preface
1 M2M in 5G Cellular Networks: Challenges, Proposed Solutions, and Future Directions
1.1 Introduction
1.2 Literature Survey
1.3 Survey Challenges and Proposed Solutions of M2M
1.4 Conclusion
References
2 MAC Layer Protocol for Wireless Security
2.1 Introduction
2.2 MAC Layer
2.3 Functions of the MAC Layer
2.4 MAC Layer Protocol
2.5 MAC Address
2.6 Conclusion and Future Scope
References
3 Enhanced Image Security Through Hybrid Approach: Protect Your Copyright Over Digital Images
3.1 Introduction
3.2 Literature Review
3.3 Design Issues
3.4 A Secure Grayscale Image Watermarking Based on DWT-SVD
3.5 Experimental Results
3.6 Conclusion
References
4 Quantum Computing
4.1 Introduction
4.2 A Brief History of Quantum Computing
4.3 Postulate of Quantum Mechanics
4.4 Polarization and Entanglement
4.5 Applications and Advancements
4.6 Optical Quantum Computing
4.7 Experimental Realisation of Quantum Computer
4.8 Challenges of Quantum Computing
4.9 Conclusion and Future Scope
References
5 Feature Engineering for Flow-Based IDS
5.1 Introduction
5.2 IP Flows
5.3 Feature Engineering
5.4 Classification of Feature Selection Technique
5.5 Tools and Library for Feature Selection
5.6 Literature Review on Feature Selection in Flow-Based IDS
5.7 Challenges and Future Scope
5.8 Conclusions
Acknowledgement
References
6 Environmental Aware Thermal (EAT) Routing Protocol for Wireless Sensor Networks
6.1 Introduction
6.2 Motivation Behind the Work
6.3 Novelty of This Work
6.4 Related Works
6.5 Proposed Environmental Aware Thermal (EAT) Routing Protocol
6.6 Simulation Parameters
6.7 Results and Discussion
6.8 Conclusion
References
7 A Comprehensive Study of Intrusion Detection and Prevention Systems
7.1 Introduction
7.2 Configuring IDPS
7.3 Literature Review
7.4 Conclusion
References
8 Hardware Devices Integration With IoT
8.1 Introduction
8.2 Literature Review
8.3 Component Description
8.4 Case Studies
8.5 Drawbacks of Arduino and Raspberry Pi
8.6 Challenges in IoT
8.7 Conclusion
8.8 Annexures
References
Additional Resources
9 Depth Analysis On DoS & DDoS Attacks
9.1 Introduction
9.2 Literature Survey
9.3 Timeline of DoS and DDoS Attacks
9.4 Evolution of Denial of Service (DoS) & Distributed Denial of Service (DDoS)
9.5 DDoS Attacks: A Taxonomic Classification
9.6 Transmission Control Protocol
9.7 User Datagram Protocol
9.8 Types of DDoS Attacks
9.9 Impact of DoS/DDoS on Various Areas
9.10 Countermeasures to DDoS Attack
9.11 Conclusion
9.12 Future Scope
References
10 SQL Injection Attack on Database System
10.1 Introduction
10.2 Objective and Motivation
10.3 Process of SQL Injection Attack
10.4 Related Work
10.5 Literature Review
10.6 Implementation of the SQL Injection Attack
10.7 Detection of SQL Injection Attack
10.8 Prevention/Mitigation from SQL Injection Attack
10.9 Conclusion
References
11 Machine Learning Techniques for Face Authentication System for Security Purposes
11.1 Introduction
11.2 Face Recognition System (FRS) in Security
11.3 Theory
11.4 Experimental Methodology
11.5 Results
11.6 Conclusion
References
12 Estimation of Computation Time for Software-Defined Networking‑Based Data Traffic Offloading System in Heterogeneous Network
12.1 Introduction
12.2 Analysis of SDN-TOS Mechanism
12.3 Materials and Methods
12.4 Simulation Results
12.5 Discussion
12.6 Conclusion
References
About the Editors
Index
Also of Interest
End User License Agreement
List of Tables
Chapter 1
Table 1.1 QoS class types for M2M communications [40–42].
Table 1.2 Optimization of low-cost and low-power M2M devices [43, 45, 46].
Chapter 3
Table 3.1 PSNR values for the Cameraman and Lena image.
Table 3.2 NC values for the Camraman and Lena image.
Chapter 6
Table 6.1 Simulation parameters for environmental influence on sensor nodes.
Chapter 7
Table 7.1 Comparison of conventional intrusion detection techniques.
Table 7.2 Summary of literature review.
Chapter 12
Table 12.1 A comparison among previous studies and the components used by thos...
Table 12.2 Parameter values used in the computation model.
List of Illustrations
Chapter 1
Figure 1.1 Cases for M2M connectivity. (a) Basic M2M connectivity, (b) M2M in ...
Figure 1.2 Applications of M2M communications [9].
Figure 1.3 Radio resource allocation in existing mobile standards [23].
Figure 1.4 Resource scheduling supports M2M communication [28].
Figure 1.5 Clustering mechanism [36].
Figure 1.6 Represents the diverse types of attacks likely to occur while M2M c...
Figure 1.7 Probable solutions for M2M security issues.
Chapter 2
Figure 2.1 OSI model representing MAC layer.
Figure 2.2 Sub-layer of data link layer.
Figure 2.3 Classification of MAC layer protocols.
Figure 2.4 Pure Aloha.
Figure 2.5 Slotted Aloha.
Figure 2.6 Assume A station communicated data but collided, wasting 2Tp in the...
Figure 2.7 Five stations and slot reservation frame.
Figure 2.8 Polling process.
Figure 2.9 Token passing process.
Figure 2.10 48-bit MAC address structure.
Chapter 3
Figure 3.1 Classification of information hiding methods.
Figure 3.2 Difference between steganography, cryptography, and digital waterma...
Figure 3.3 Breaking watermarking system by possible attackers.
Figure 3.4 An example of LSB Spatial Domain Watermarking [69].
Figure 3.5 The flowchart of proposed algorithm.
Figure 3.6 (a) Original host image Cameraman, (b) Original host image Lena, an...
Figure 3.7 (a) Watermarked Cameraman image and extracted watermark when non-at...
Figure 3.8 (a) Blurring attack on Lena image, (b) cropping attack on Lena imag...
Figure 3.9 PSNR values for the results obtained by the method proposed in [7, ...
Figure 3.10 PSNR values for the results obtained by the method proposed in [7,...
Chapter 4
Figure 4.1 Quantum satellite transmission [Bacsardi
et al
., [4].
Figure 4.2 Configurations of satellite communication [Marshall
et al
., [6].
Figure 4.3 Vertical and horizontal polarization [1, 9].
Figure 4.4 Representation of vector of different polarizations (photon) [1] Sa...
Chapter 5
Figure 5.1 Intrusion detection system classification [1].
Figure 5.2 Architecture of IP flow flow-based IDS [6].
Figure 5.3 Flow-based wireless intrusion detection systems [10].
Figure 5.4 Feature engineering in machine learning workflow [13].
Figure 5.5 Curse of dimensionality [14].
Figure 5.6 Classification of feature selection.
Chapter 6
Fig. 6.1 Routing protocol used in wireless sensor network.
Fig. 6.2 Single path communication protocol.
Fig. 6.3 Communication failure due to node head heating.
Fig. 6.4 Shortest path established between source and destination for data tr...
Fig. 6.5 Node failure in established routing path with data transmission loss...
Fig. 6.6 Data transmission through an alternative path.
Fig. 6.7 Environmental aware thermal (EAT) routing protocol.
Fig. 6.8 Temperature variation of sensor node at different time.
Fig. 6.9 Average power consumption for different data rate.
Fig. 6.10 Lifetime analysis for all three cases.
Fig. 6.11 Delivery delay analysis over temperature.
Chapter 7
Figure 7.1 Intrusion detection working.
Figure 7.2 (i) IDS, and (ii) IPS.
Figure 7.3 A typical IDPS Architecture.
Figure 7.4 NIDS.
Figure 7.5 HIDS.
Figure 7.6 Signature-based technique.
Figure 7.7 Anomaly-based technique.
Figure 7.8 Architecture of hybrid-based methodology.
Chapter 8
Figure 8.1 Arduino UNO board.
Figure 8.2 Raspberry Pi 4 board.
Figure 8.3 Connections of ultrasonic sensor for measuring distance.
Figure 8.4 Distance readings.
Figure 8.5 Connections for measuring temperature and humidity.
Figure 8.6 Output measurements in Arduino IDE.
Figure 8.7 Working diagram of weather monitoring.
Figure 8.8 Flow chart.
Chapter 9
Figure 9.1 DDoS using zombie network [13].
Figure 9.2 Average annual cost of cyberattack by its type (2018 costs about US...
Figure 9.3 Size of DDoS attack in Gb/s [5].
Figure 9.4 Classification of DDoS attacks by degree [15].
Figure 9.5 TCP 3-way handshake [17].
Figure 9.6 UDP header [29].
Figure 9.7 DDoS attacks types [5].
Figure 9.8 TCP SYN flood [3].
Figure 9.9 UDP flood [21].
Figure 9.10 Smurf attack [20].
Figure 9.11 Ping of death [20].
Figure 9.12 HTTP flood attack [21].
Figure 9.13 DOS attack in vehicle-to-infrastructure communications [23].
Figure 9.14 DOS attack in vehicle-to-vehicle communications [23].
Figure 9.15 Countermeasures to DDoS attack [27].
Chapter 10
Figure 10.3.1 Flowchart of SQL injection attack.
Figure 10.5.1 Code for filtered incorrectly escape characters [2].
Figure 10.5.2 Malicious attack by replacing the “username” in incorrect way [2...
Figure 10.5.3 Multiple SQL queries attack by attacker [2].
Figure 10.5.4 Conditional response [2].
Figure 10.5.5 SQL injection and DNS attack [2].
Figure 10.6.1.1 Student table creation and insert the values [4].
Figure 10.6.1.2 Access the table [4].
Figure 10.6.1.3 Unauthorized table access using 1=1 sql statement [4].
Figure 10.6.2.1 Student table creation and insert the values [4].
Figure 10.6.2.2 Access the table [4].
Figure 10.6.2.3 Unauthorized table access using ‘’’’=’’’’ sql statement [4].
Figure 10.6.3.1 Student table creation and insert the value [4].
Figure 10.6.3.2 Access the table [4].
Figure 10.6.3.3 Modify table content using batched sql statement [4].
Figure 10.6.3.4 Delete table content using batched sql statement [4]
Figure 10.6.3.5 Drop table using batched sql statement [4].
Chapter 11
Figure 11.1 Architecture of convolutional neural network.
Figure 11.2 Summary of convolutional neural network.
Figure 11.3 Compilation of convolutional neural network.
Figure 11.4 Summary and Hyperparameters of K-Nearest Neighbor classifier.
Figure 11.5 Summary and Hyperparameters of support vector machine classifier.
Figure 11.6 Summary and hyperparameters of Naive Bayes classifier.
Figure 11.7 Summary and hyperparameters of Logistic Regression classifier.
Figure 11.8 Summary and hyperparameters of Decision Tree classifier.
Figure 11.9 Accuracy comparison between convolutional neural network (CNN) and...
Chapter 12
Figure 12.1 The system architecture of Software-defined network-based data tra...
Figure 12.2 Overview of Wi-Fi Mininet emulator including LTE network and Wi-Fi...
Figure 12.3 Time computation model for SDN-based data traffic offloading (SDN-...
Figure 12.4 The overview of centralized SDN controller with three major sub-co...
Figure 12.5 Effect of computational data traffic (θ
I
) on the total response ti...
Figure 12.6 Effect of computational data traffic (θ
I
) on the total response ti...
Guide
Cover Page
Series Page
Title Page
Copyright Page
Preface
Table of Contents
Begin Reading
About the Editors
Index
Also of Interest
WILEY END USER LICENSE AGREEMENT
Pages
ii
iii
iv
xii
xiv
xv
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
253
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset