1-The scurity of existing wireless networks
2-Upcoming wireless networks and new challenges
3-Trust assumption and adversary models
4-Naming and addressing
5-Establishment of security associations
6-Securing neighbor discovery
7-Secure routing in multi-hop wireless networks
8-Privacy protection
9-Selfish behavior at the MAC layer of CSMA/CA
10-Selfishness in packet forwarding
11-Wireless operations in a shared spectrum
12-Secure protocols for behavior enforcement
Appendix A:Introduction to cryptographic algorithms and protocols
Appendix B:A tutorial on game theory for wireless networks