, ,

Wireless and Mobile Network Security

Specificaties
Gebonden, 688 blz. | Engels
John Wiley & Sons | e druk, 2009
ISBN13: 9781848211179
Rubricering
John Wiley & Sons e druk, 2009 9781848211179
€ 427,09
Levertijd ongeveer 15 werkdagen

Samenvatting

This book provides a thorough examination and analysis of cutting–edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This material will be of invaluable use to all those working in the network security field, and especially to the many people entering the field. The next area of focus is on the security issues and available solutions associated with off–the–shelf wireless and mobile technologies such as Bluetooth, WiFi, WiMax, 2G, and 3G. There is coverage of the security techniques used to protect applications downloaded by mobile terminals through mobile cellular networks, and finally the book addresses security issues and solutions in emerging wireless and mobile technologies such as ad hoc and sensor networks, cellular 4G and IMS networks.

Specificaties

ISBN13:9781848211179
Taal:Engels
Bindwijze:gebonden
Aantal pagina's:688

Inhoudsopgave

<p>Introduction. xvii</p>
<p>PART 1. Basic Concepts 1</p>
<p>Chapter 1. Introduction to Mobile and Wireless Networks 3<br /> Hakima CHAOUCHI and Tara ALI YAHIYA</p>
<p>1.1. Introduction 3</p>
<p>1.2. Mobile cellular networks 4</p>
<p>1.3. IEEE wireless networks 13</p>
<p>1.4. Mobile Internet networks 32</p>
<p>1.5. Current trends 42</p>
<p>1.6. Conclusions 44</p>
<p>1.7. Bibliography 45</p>
<p>Chapter 2. Vulnerabilities of Wired and Wireless Networks 47<br /> Artur HECKER</p>
<p>2.1. Introduction 47</p>
<p>2.2. Security in the digital age 48</p>
<p>2.3. Threats and risks to telecommunications systems 55</p>
<p>2.4. From wireline vulnerabilities to vulnerabilities in wireless communications 67</p>
<p>2.5. Conclusions 70</p>
<p>2.6. Bibliography 71</p>
<p>Chapter 3. Fundamental Security Mechanisms 73<br /> Maryline LAURENT–MAKNAVICIUS, Hakima CHAOUCHI and Olivier PAUL</p>
<p>3.1. Introduction 73</p>
<p>3.2. Basics on security 73</p>
<p>3.3. Secure communication protocols and VPN implementation 88</p>
<p>3.4. Authentication 105</p>
<p>3.5. Access control 118</p>
<p>3.6. Conclusions126</p>
<p>3.7. Bibliography 126<br /> <br /> Chapter 4. Wi–Fi Security Dedicated Architectures 131<br /> Franck VEYSSET, Laurent BUTTI and Jer&ocirc;me RAZNIEWSKI</p>
<p>4.1. Introduction 131</p>
<p>4.2. Hot spot architecture: captive portals131</p>
<p>4.3. Wireless intrusion detection systems (WIDS) 137</p>
<p>4.4. Wireless honeypots 145</p>
<p>Chapter 5. Multimedia Content Watermarking 149<br /> Mihai MITREA and Fran&ccedil;oise PR&Ecirc;TEUX</p>
<p>5.1. Introduction 149</p>
<p>5.2. Robust watermarking: a new challenge for the information society 150</p>
<p>5.3. Different constraints for different types of media 157</p>
<p>5.4. Toward the watermarking theoretical model 172</p>
<p>5.5. Discussion and perspectives 188</p>
<p>5.6. Conclusion 195</p>
<p>5.7. Bibliography 196</p>
<p>PART 2. Off–the Shelf Technologies 203</p>
<p>Chapter 6. Bluetooth Security 205<br /> Franck GILLET</p>
<p>6.1. Introduction 205</p>
<p>6.2. Bluetooth technical specification 207</p>
<p>6.3. Bluetooth security 220</p>
<p>6.4. Conclusion 228</p>
<p>6.5. Bibliography 229</p>
<p>Chapter 7. Wi–Fi Security 231<br /> Guy PUJOLLE</p>
<p>7.1. Introduction 231</p>
<p>7.2. Attacks on wireless networks 232</p>
<p>7.3. Security in the IEEE 802.11 standard 235</p>
<p>7.4. Security in 802.1x 245</p>
<p>7.5. Security in 802.11i 249</p>
<p>7.6. Authentication in wireless networks 258</p>
<p>7.7. Layer 3 security mechanisms 263</p>
<p>7.8. Bibliography 270</p>
<p>Chapter 8. WiMAX Security 271<br /> Pascal URIEN, translated by L&eacute;a URIEN</p>
<p>8.1. Introduction 271</p>
<p>8.2. WiMAX low layers 276</p>
<p>8.3. Security according to 802.16–2004 283</p>
<p>8.4. Security according to the IEEE–802.16e standard 293</p>
<p>8.5. The role of the smart card in WiMAX infrastructures 308</p>
<p>8.6. Conclusion 311</p>
<p>8.7. Glossary 311</p>
<p>8.8. Bibliography 313</p>
<p>Chapter 9. Security in Mobile Telecommunication Networks 315<br /> J&eacute;r&ocirc;me H&Auml;RRI and Christian BONNET</p>
<p>9.1. Introduction 315</p>
<p>9.2. Signaling 317</p>
<p>9.3. Security in the GSM 326</p>
<p>9.4. GPRS security 338</p>
<p>9.5. 3G security 349</p>
<p>9.6. Network interconnection 356</p>
<p>9.7. Conclusion 357</p>
<p>9.8. Bibliography 358</p>
<p>Chapter 10. Security of Downloadable Applications 361<br /> Pierre CR&Eacute;GUT, Isabelle RAVOT and Cuihtlauac ALVARADO</p>
<p>10.1. Introduction 361</p>
<p>10.2. Opening the handset 362</p>
<p>10.3. Security policy 363</p>
<p>10.4. The implementation of a security policy 368</p>
<p>10.5. Execution environments for active contents 370</p>
<p>10.6. Validation of active contents 382</p>
<p>10.7. Detection of attacks 391</p>
<p>10.8. Conclusion 402</p>
<p>10.9. Bibliography 404</p>
<p>PART 3. Emerging Technologies 409</p>
<p>Chapter 11. Security in Next Generation Mobile Networks 411<br /> J&eacute;r&ocirc;me H&Auml;RRI and Christian BONNET</p>
<p>11.1. Introduction 411</p>
<p>11.2. The SIP 414</p>
<p>11.3. VoIP 418</p>
<p>11.4. IP Multimedia Subsystem (IMS) 422</p>
<p>11.5. 4G security 429</p>
<p>11.6. Confidentiality 431</p>
<p>11.7. Conclusion 433</p>
<p>11.8. Bibliography 434</p>
<p>Chapter 12. Security of IP–Based Mobile Networks 437<br /> Jean–Michel COMBES, Daniel MIGAULT, Julien BOURNELLE, Hakima CHAOUCHI and Maryline LAURENT–MAKNAVICIUS</p>
<p>12.1. Introduction 437</p>
<p>12.2. Security issues related to mobility 438</p>
<p>12.3. Mobility with MIPv6 442</p>
<p>12.4. Mobility with Mobile IPv4 457</p>
<p>12.5. Mobility with MOBIKE 460</p>
<p>12.6. IP mobility with HIP and NetLMM 462</p>
<p>12.7. Conclusions 467</p>
<p>12.8. Glossary 468</p>
<p>12.9. Bibliography 470</p>
<p>Chapter 13. Security in Ad Hoc Networks 475<br /> Jean–Marie ORSET and Ana CAVALLI</p>
<p>13.1. Introduction 475</p>
<p>13.2. Motivations and application fields 475</p>
<p>13.3. Routing protocols 479</p>
<p>13.4. Attacks to routing protocols 484</p>
<p>13.5. Security mechanisms 490</p>
<p>13.6. Auto–configuration 514</p>
<p>13.7. Conclusion 519</p>
<p>13.8. Bibliography 521</p>
<p>Chapter 14. Key Management in Ad Hoc Networks 525<br /> Mohamed SALAH BOUASSIDA, Isabelle CHRISMENT and Olivier FESTOR</p>
<p>14.1. Introduction 525</p>
<p>14.2. Authentication issue within ad hoc networks 526</p>
<p>14.3. Group key management within ad hoc networks 534</p>
<p>14.4. Discussions 554</p>
<p>14.5. Conclusions 560</p>
<p>14.6. Bibliography 561</p>
<p>Chapter 15. Wireless Sensor Network Security 565<br /> Jos&eacute;–Marcos NOGUEIRA, Hao–Chi WONG, Antonio A.F. LOUREIRO, Chakib BEKARA, Maryline LAURENT–MAKNAVICIUS, Ana Paula RIBEIRO DA SILVA, S&eacute;rgio de OLIVEIRA and Fernando A. TEIXEIRA</p>
<p>15.1. Introduction 565</p>
<p>15.2. Attacks on wireless sensor networks and counter–measures 567</p>
<p>15.3. Prevention mechanisms: authentication and traffic protection 571</p>
<p>15.4. Case study: centralized and passive intruder detection 582</p>
<p>15.5. Case study: decentralized intrusion detection 589</p>
<p>15.6. Case study: intrusion tolerance with multiple routes 598</p>
<p>15.7. Conclusion 607</p>
<p>15.8. Bibliography 609</p>
<p>Chapter 16. Key Management in Wireless Sensor Networks 613<br /> Chakib BEKARA and Maryline LAURENT–MAKNAVICIUS</p>
<p>16.1. Introduction 613</p>
<p>16.2. Introduction to key management 614</p>
<p>16.3. Security needs of WSNs 616</p>
<p>16.4. Key management problems in WSNs 617</p>
<p>16.5. Metric for evaluating key management protocols in WSNs 620</p>
<p>16.6. Classification of key management protocols in WSNs 621</p>
<p>16.7. Notations and assumptions 622</p>
<p>16.8. Broadcast source authentication protocols 623</p>
<p>16.9. Probabilistic key management protocols 627</p>
<p>16.10. Deterministic key management protocols 631</p>
<p>16.11. Hybrid key management protocols 637</p>
<p>16.12. Comparison of key management protocols in WSNs 641</p>
<p>16.13. Conclusion 646</p>
<p>16.14. Bibliography 647</p>
<p>Conclusion 649</p>
<p>List of Authors 653</p>
<p>Index 657</p>
€ 427,09
Levertijd ongeveer 15 werkdagen

Rubrieken

    Personen

      Trefwoorden

        Wireless and Mobile Network Security