Security in Wireless Communication Networks
Home > Science, Technology & Agriculture > Electronics and communications engineering > Communications engineering / telecommunications > WAP (wireless) technology > Security in Wireless Communication Networks: (IEEE Press)
Security in Wireless Communication Networks: (IEEE Press)

Security in Wireless Communication Networks: (IEEE Press)

|
     0     
5
4
3
2
1




Available


About the Book

Receive comprehensive instruction on the fundamentals of wireless security from three leading international voices in the field Security in Wireless Communication Networksdelivers a thorough grounding in wireless communication security. The distinguished authors pay particular attention to wireless specific issues, like authentication protocols for various wireless communication networks,encryption algorithms and integrity schemes on radio channels, lessons learned from designing secure wireless systems and standardization for security in wireless systems. The book addresses how engineers, administrators, and others involved in the design and maintenance of wireless networks can achieve security while retaining the broadcast nature of the system, with all of its inherent harshness and interference. Readers will learn: A comprehensive introduction to the background of wireless communication network security, including a broad overview of wireless communication networks, security services, the mathematics crucial to the subject, and cryptographic techniques An exploration of wireless local area network security, including Bluetooth security, Wi-Fi security, and body area network security An examination of wide area wireless network security, including treatments of 2G, 3G, and 4G Discussions of future development in wireless security, including 5G, and vehicular ad-hoc network security Perfect for undergraduate and graduate students in programs related to wireless communication, Security in Wireless Communication Networks will also earn a place in the libraries of professors, researchers, scientists, engineers, industry managers, consultants, and members of government security agencies who seek to improve their understanding of wireless security protocols and practices.

Table of Contents:
Preface xvii Acknowledgments xxiii About the Companion Website xxv Part I Introduction and Mathematics Background 1 1 Introduction 3 1.1 General Computer Communication Network Architecture 3 1.2 Different Types of Wireless Communication Systems 5 1.3 Network Security and Wireless Security 9 1.4 Summary 11 2 Basic Network Security Concepts 13 2.1 Security Attacks 13 2.2 Security Services 16 2.3 Security Mechanisms 21 2.4 Other Security Concepts 24 2.5 Summary 25 3 Mathematical Background 27 3.1 Basic Concepts in Modern Algebra and Number Theory 27 3.2 Prime Numbers, Modular Arithmetic, and Divisors 30 3.3 Finite Field and Galois Field 34 3.4 Polynomial Arithmetic 35 3.5 Fermat’s Little Theorem, Euler’s Totient Function, and Euler’s Theorem 41 3.6 Primality Testing 44 3.7 Chinese Remainder Theorem 46 3.8 Discrete Logarithm 48 3.9 Summary 49 Part II Cryptographic Systems 51 4 Cryptographic Techniques 53 4.1 Symmetric Encryption 53 4.2 Classical Cryptographic Schemes 53 4.3 Stream Cipher 62 4.4 Modern Block Ciphers 63 4.5 Data Encryption Standard (DES) 67 4.6 Summary 76 5 More on Cryptographic Techniques 77 5.1 Advanced Encryption Standard 77 5.2 Block Cipher Modes of Operation 85 5.3 Public Key Infrastructure 92 5.4 The RSA Algorithm 95 5.5 Diffie–Hellman (D–H) Key Exchange 97 5.6 Summary 99 6 Message Authentication, Digital Signature, and Key Management 101 6.1 Message Authentication 101 6.2 MAC and Hash Algorithms 105 6.3 Digital Signature and Authentication 114 6.4 Key Management 122 6.5 Summary 128 Part III Security for Wireless Local Area Networks 129 7 WLAN Security 131 7.1 Introduction to WLAN 131 7.2 Evolution of WLAN Security 133 7.3 Wired Equivalent Privacy 135 7.4 IEEE 802.1X Authentication Model 140 7.5 IEEE 802.11i Standard 143 7.6 Wi-Fi Protected Access 3 and Opportunistic Wireless Encryption 150 7.7 Summary 152 8 Bluetooth Security 153 8.1 Introduction to Bluetooth 153 8.2 Link Key Generation 157 8.3 Authentication, Confidentiality, and Trust and Service Levels 163 8.4 Cryptographic Functions for Security Modes 1, 2, and 3 166 8.5 Cryptographic Functions in Security Mode 4 (SSP) 173 8.6 Summary 174 9 Zigbee Security 177 9.1 Introduction to Zigbee 177 9.2 IEEE 802.15.4 Security Features 179 9.3 Zigbee Upper Layer Security 182 9.4 Security-Related MAC PIB Attributes 187 9.5 Mechanisms Used in Zigbee Security 188 9.6 Summary 191 10 RFID Security 193 10.1 Introduction to RFID 193 10.2 Security Attacks, Risks, and Objectives of RFID Systems 195 10.3 Mitigation Strategies and Countermeasures for RFID Security Risks 196 10.4 RFID Security Mechanisms 199 10.5 Summary 205 Part IV Security for Wireless Wide Area Networks 207 11 GSM Security 209 11.1 GSM System Architecture 209 11.2 GSM Network Access Security Features 212 11.3 GSM Security Algorithms 215 11.4 Attacks Against GSM Security 225 11.5 Possible GSM Security Improvements 227 11.6 Summary 228 12 UMTS Security 229 12.1 UMTS System Architecture 229 12.2 UMTS Security Features 231 12.3 UMTS Network Access Security 232 12.4 Algorithms in Access Security 240 12.5 Other UMTS Security Features 249 12.6 Summary 250 13 LTE Security 251 13.1 LTE System Architecture 251 13.2 LTE Security Architecture 253 13.3 LTE Security 255 13.4 Handover Between eNBs 261 13.5 Security Algorithms 268 13.6 Security for Interworking Between LTE and Legacy Systems 273 13.7 Summary 278 Part V Security for Next Generation Wireless Networks 279 14 Security in 5G Wireless Networks 281 14.1 Introduction to 5G Wireless Network Systems 281 14.2 5G Security Requirements and Major Drives 283 14.3 A 5G Wireless Security Architecture 287 14.4 5G Wireless Security Services 289 14.5 5G Key Management 300 14.6 Security for New Communication Techniques in 5G 303 14.7 Challenges and Future Directions for 5G Wireless Security 308 14.8 Summary 310 15 Security in V2X Communications 311 15.1 Introduction to V2X Communications 311 15.2 Security Requirements and Possible Attacks in V2X Communications 314 15.3 IEEE WAVE Security Services for Applications and Management Messages 316 15.4 Security in Cellular Based V2X Communications 320 15.5 Cryptography and Privacy Preservation in V2X Communications 323 15.6 Challenges and Future Research Directions 329 15.7 Summary 331 References 333 Index 345


Best Sellers


Product Details
  • ISBN-13: 9781119244363
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-IEEE Press
  • Height: 244 mm
  • No of Pages: 384
  • Returnable: N
  • Spine Width: 27 mm
  • Width: 170 mm
  • ISBN-10: 1119244366
  • Publisher Date: 16 Dec 2021
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Series Title: IEEE Press
  • Weight: 794 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Security in Wireless Communication Networks: (IEEE Press)
John Wiley & Sons Inc -
Security in Wireless Communication Networks: (IEEE Press)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Security in Wireless Communication Networks: (IEEE Press)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!