ABSTRACT
Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510
As noted in Chapter 1, security is an important concern in all applications of
wireless communication. There are different possible types of security threats in a
wireless communication network, whether cellular, ad hoc, cognitive radio network,
or wireless sensor network. Such threats threaten a network in multiple ways. An
attacker may be a node of the network (called an intruder), or may be a node out-
side the network. For example, if we are concerned about message communication
amongst the nodes of a MANET, an internal attacker may be a misbehaving or ad-
versary node which is a member of the same network, while an external attacker may
be a node which is not an integral part of the network.