Wireless and Mobile Network Security
Home > Computing and Information Technology > Computer networking and communications > Wireless and Mobile Network Security
Wireless and Mobile Network Security

Wireless and Mobile Network Security

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This material will be of invaluable use to all those working in the network security field, and especially to the many people entering the field. The next area of focus is on the security issues and available solutions associated with off-the-shelf wireless and mobile technologies such as Bluetooth, WiFi, WiMax, 2G, and 3G. There is coverage of the security techniques used to protect applications downloaded by mobile terminals through mobile cellular networks, and finally the book addresses security issues and solutions in emerging wireless and mobile technologies such as ad hoc and sensor networks, cellular 4G and IMS networks.

Table of Contents:
Introduction. xvii PART 1. Basic Concepts 1 Chapter 1. Introduction to Mobile and Wireless Networks 3 Hakima CHAOUCHI and Tara ALI YAHIYA 1.1. Introduction 3 1.2. Mobile cellular networks 4 1.3. IEEE wireless networks 13 1.4. Mobile Internet networks 32 1.5. Current trends 42 1.6. Conclusions 44 1.7. Bibliography 45 Chapter 2. Vulnerabilities of Wired and Wireless Networks 47 Artur HECKER 2.1. Introduction 47 2.2. Security in the digital age 48 2.3. Threats and risks to telecommunications systems 55 2.4. From wireline vulnerabilities to vulnerabilities in wireless communications 67 2.5. Conclusions 70 2.6. Bibliography 71 Chapter 3. Fundamental Security Mechanisms 73 Maryline LAURENT-MAKNAVICIUS, Hakima CHAOUCHI and Olivier PAUL 3.1. Introduction 73 3.2. Basics on security 73 3.3. Secure communication protocols and VPN implementation 88 3.4. Authentication 105 3.5. Access control 118 3.6. Conclusions126 3.7. Bibliography 126 Chapter 4. Wi-Fi Security Dedicated Architectures 131 Franck VEYSSET, Laurent BUTTI and Jerôme RAZNIEWSKI 4.1. Introduction 131 4.2. Hot spot architecture: captive portals131 4.3. Wireless intrusion detection systems (WIDS) 137 4.4. Wireless honeypots 145 Chapter 5. Multimedia Content Watermarking 149 Mihai MITREA and Françoise PRÊTEUX 5.1. Introduction 149 5.2. Robust watermarking: a new challenge for the information society 150 5.3. Different constraints for different types of media 157 5.4. Toward the watermarking theoretical model 172 5.5. Discussion and perspectives 188 5.6. Conclusion 195 5.7. Bibliography 196 PART 2. Off-the Shelf Technologies 203 Chapter 6. Bluetooth Security 205 Franck GILLET 6.1. Introduction 205 6.2. Bluetooth technical specification 207 6.3. Bluetooth security 220 6.4. Conclusion 228 6.5. Bibliography 229 Chapter 7. Wi-Fi Security 231 Guy PUJOLLE 7.1. Introduction 231 7.2. Attacks on wireless networks 232 7.3. Security in the IEEE 802.11 standard 235 7.4. Security in 802.1x 245 7.5. Security in 802.11i 249 7.6. Authentication in wireless networks 258 7.7. Layer 3 security mechanisms 263 7.8. Bibliography 270 Chapter 8. WiMAX Security 271 Pascal URIEN, translated by Léa URIEN 8.1. Introduction 271 8.2. WiMAX low layers 276 8.3. Security according to 802.16-2004 283 8.4. Security according to the IEEE-802.16e standard 293 8.5. The role of the smart card in WiMAX infrastructures 308 8.6. Conclusion 311 8.7. Glossary 311 8.8. Bibliography 313 Chapter 9. Security in Mobile Telecommunication Networks 315 Jérôme HÄRRI and Christian BONNET 9.1. Introduction 315 9.2. Signaling 317 9.3. Security in the GSM 326 9.4. GPRS security 338 9.5. 3G security 349 9.6. Network interconnection 356 9.7. Conclusion 357 9.8. Bibliography 358 Chapter 10. Security of Downloadable Applications 361 Pierre CRÉGUT, Isabelle RAVOT and Cuihtlauac ALVARADO 10.1. Introduction 361 10.2. Opening the handset 362 10.3. Security policy 363 10.4. The implementation of a security policy 368 10.5. Execution environments for active contents 370 10.6. Validation of active contents 382 10.7. Detection of attacks 391 10.8. Conclusion 402 10.9. Bibliography 404 PART 3. Emerging Technologies 409 Chapter 11. Security in Next Generation Mobile Networks 411 Jérôme HÄRRI and Christian BONNET 11.1. Introduction 411 11.2. The SIP 414 11.3. VoIP 418 11.4. IP Multimedia Subsystem (IMS) 422 11.5. 4G security 429 11.6. Confidentiality 431 11.7. Conclusion 433 11.8. Bibliography 434 Chapter 12. Security of IP-Based Mobile Networks 437 Jean-Michel COMBES, Daniel MIGAULT, Julien BOURNELLE, Hakima CHAOUCHI and Maryline LAURENT-MAKNAVICIUS 12.1. Introduction 437 12.2. Security issues related to mobility 438 12.3. Mobility with MIPv6 442 12.4. Mobility with Mobile IPv4 457 12.5. Mobility with MOBIKE 460 12.6. IP mobility with HIP and NetLMM 462 12.7. Conclusions 467 12.8. Glossary 468 12.9. Bibliography 470 Chapter 13. Security in Ad Hoc Networks 475 Jean-Marie ORSET and Ana CAVALLI 13.1. Introduction 475 13.2. Motivations and application fields 475 13.3. Routing protocols 479 13.4. Attacks to routing protocols 484 13.5. Security mechanisms 490 13.6. Auto-configuration 514 13.7. Conclusion 519 13.8. Bibliography 521 Chapter 14. Key Management in Ad Hoc Networks 525 Mohamed SALAH BOUASSIDA, Isabelle CHRISMENT and Olivier FESTOR 14.1. Introduction 525 14.2. Authentication issue within ad hoc networks 526 14.3. Group key management within ad hoc networks 534 14.4. Discussions 554 14.5. Conclusions 560 14.6. Bibliography 561 Chapter 15. Wireless Sensor Network Security 565 José-Marcos NOGUEIRA, Hao-Chi WONG, Antonio A.F. LOUREIRO, Chakib BEKARA, Maryline LAURENT-MAKNAVICIUS, Ana Paula RIBEIRO DA SILVA, Sérgio de OLIVEIRA and Fernando A. TEIXEIRA 15.1. Introduction 565 15.2. Attacks on wireless sensor networks and counter-measures 567 15.3. Prevention mechanisms: authentication and traffic protection 571 15.4. Case study: centralized and passive intruder detection 582 15.5. Case study: decentralized intrusion detection 589 15.6. Case study: intrusion tolerance with multiple routes 598 15.7. Conclusion 607 15.8. Bibliography 609 Chapter 16. Key Management in Wireless Sensor Networks 613 Chakib BEKARA and Maryline LAURENT-MAKNAVICIUS 16.1. Introduction 613 16.2. Introduction to key management 614 16.3. Security needs of WSNs 616 16.4. Key management problems in WSNs 617 16.5. Metric for evaluating key management protocols in WSNs 620 16.6. Classification of key management protocols in WSNs 621 16.7. Notations and assumptions 622 16.8. Broadcast source authentication protocols 623 16.9. Probabilistic key management protocols 627 16.10. Deterministic key management protocols 631 16.11. Hybrid key management protocols 637 16.12. Comparison of key management protocols in WSNs 641 16.13. Conclusion 646 16.14. Bibliography 647 Conclusion 649 List of Authors 653 Index 657


Best Sellers


Product Details
  • ISBN-13: 9781848211179
  • Publisher: ISTE Ltd and John Wiley & Sons Inc
  • Publisher Imprint: ISTE Ltd and John Wiley & Sons Inc
  • Height: 241 mm
  • No of Pages: 744
  • Returnable: N
  • Weight: 1111 gr
  • ISBN-10: 1848211171
  • Publisher Date: 05 Jun 2009
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Spine Width: 43 mm
  • Width: 164 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Wireless and Mobile Network Security
ISTE Ltd and John Wiley & Sons Inc -
Wireless and Mobile Network Security
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Wireless and Mobile Network Security

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!