ABSTRACT

Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510

As noted in Chapter 1, security is an important concern in all applications of

wireless communication. There are different possible types of security threats in a

wireless communication network, whether cellular, ad hoc, cognitive radio network,

or wireless sensor network. Such threats threaten a network in multiple ways. An

attacker may be a node of the network (called an intruder), or may be a node out-

side the network. For example, if we are concerned about message communication

amongst the nodes of a MANET, an internal attacker may be a misbehaving or ad-

versary node which is a member of the same network, while an external attacker may

be a node which is not an integral part of the network.