35,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 1-2 Wochen
payback
18 °P sammeln
  • Broschiertes Buch

For the last decade or so wireless and mobile communication and its application have been enjoying tremendous attention because of their unique features. More recently, an increasing emphasis has been on the potential of infrastructure less wireless mobile networks that are easy, fast and in-expensive to set up, with the view that such technologies will enable numerous new applications in a wide range of areas. Wireless Mesh Networks (WMNs) is one of such network for providing wireless broadband internet connectivity over a selected geographic region. However, security in WMNs is still its…mehr

Produktbeschreibung
For the last decade or so wireless and mobile communication and its application have been enjoying tremendous attention because of their unique features. More recently, an increasing emphasis has been on the potential of infrastructure less wireless mobile networks that are easy, fast and in-expensive to set up, with the view that such technologies will enable numerous new applications in a wide range of areas. Wireless Mesh Networks (WMNs) is one of such network for providing wireless broadband internet connectivity over a selected geographic region. However, security in WMNs is still its primary stage as very little attention has been devoted so far to this topic by the research community. At the same time a lots of security based protocol has been proposed and developed for wireless ad hoc network. This thesis is concerned with the security issues of WMNs, analysis of security solutions for WMNs.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Autorenporträt
Golam Moktader Nayeem is currently working as a Assistant Professor in the Department of Electronic and Communication Engineering (ECE), Southern University Bangladesh. He received his M.Sc. degree from IUT in 2008. His current research interests are in Network Protocols, Cryptography, Collaborative Pervasive Networks and Data Mining.