Alle Infos zum eBook verschenken
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This material will be of invaluable use to all those working in the network security field, and especially to the many people entering the field. The next area of focus is on the security issues and available solutions associated with off-the-shelf wireless and…mehr
- Geräte: eReader
- mit Kopierschutz
- eBook Hilfe
- Größe: 7.05MB
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Wiley-Scrivener
- Seitenzahl: 744
- Erscheinungstermin: 1. März 2013
- Englisch
- ISBN-13: 9781118619544
- Artikelnr.: 37651274
- Verlag: Wiley-Scrivener
- Seitenzahl: 744
- Erscheinungstermin: 1. März 2013
- Englisch
- ISBN-13: 9781118619544
- Artikelnr.: 37651274
PART 1. Basic Concepts 1
Chapter 1. Introduction to Mobile and Wireless Networks 3
Hakima CHAOUCHI and Tara ALI YAHIYA
1.1. Introduction 3
1.2. Mobile cellular networks 4
1.3. IEEE wireless networks 13
1.4. Mobile Internet networks 32
1.5. Current trends 42
1.6. Conclusions 44
1.7. Bibliography 45
Chapter 2. Vulnerabilities of Wired and Wireless Networks 47
Artur HECKER
2.1. Introduction 47
2.2. Security in the digital age 48
2.3. Threats and risks to telecommunications systems 55
2.4. From wireline vulnerabilities to vulnerabilities in wireless
communications 67
2.5. Conclusions 70
2.6. Bibliography 71
Chapter 3. Fundamental Security Mechanisms 73
Maryline LAURENT-MAKNAVICIUS, Hakima CHAOUCHI and Olivier PAUL
3.1. Introduction 73
3.2. Basics on security 73
3.3. Secure communication protocols and VPN implementation 88
3.4. Authentication 105
3.5. Access control 118
3.6. Conclusions126
3.7. Bibliography 126
Chapter 4. Wi-Fi Security Dedicated Architectures 131
Franck VEYSSET, Laurent BUTTI and Jerôme RAZNIEWSKI
4.1. Introduction 131
4.2. Hot spot architecture: captive portals131
4.3. Wireless intrusion detection systems (WIDS) 137
4.4. Wireless honeypots 145
Chapter 5. Multimedia Content Watermarking 149
Mihai MITREA and Françoise PRÊTEUX
5.1. Introduction 149
5.2. Robust watermarking: a new challenge for the information society 150
5.3. Different constraints for different types of media 157
5.4. Toward the watermarking theoretical model 172
5.5. Discussion and perspectives 188
5.6. Conclusion 195
5.7. Bibliography 196
PART 2. Off-the Shelf Technologies 203
Chapter 6. Bluetooth Security 205
Franck GILLET
6.1. Introduction 205
6.2. Bluetooth technical specification 207
6.3. Bluetooth security 220
6.4. Conclusion 228
6.5. Bibliography 229
Chapter 7. Wi-Fi Security 231
Guy PUJOLLE
7.1. Introduction 231
7.2. Attacks on wireless networks 232
7.3. Security in the IEEE 802.11 standard 235
7.4. Security in 802.1x 245
7.5. Security in 802.11i 249
7.6. Authentication in wireless networks 258
7.7. Layer 3 security mechanisms 263
7.8. Bibliography 270
Chapter 8. WiMAX Security 271
Pascal URIEN, translated by Léa URIEN
8.1. Introduction 271
8.2. WiMAX low layers 276
8.3. Security according to 802.16-2004 283
8.4. Security according to the IEEE-802.16e standard 293
8.5. The role of the smart card in WiMAX infrastructures 308
8.6. Conclusion 311
8.7. Glossary 311
8.8. Bibliography 313
Chapter 9. Security in Mobile Telecommunication Networks 315
Jérôme HÄRRI and Christian BONNET
9.1. Introduction 315
9.2. Signaling 317
9.3. Security in the GSM 326
9.4. GPRS security 338
9.5. 3G security 349
9.6. Network interconnection 356
9.7. Conclusion 357
9.8. Bibliography 358
Chapter 10. Security of Downloadable Applications 361
Pierre CRÉGUT, Isabelle RAVOT and Cuihtlauac ALVARADO
10.1. Introduction 361
10.2. Opening the handset 362
10.3. Security policy 363
10.4. The implementation of a security policy 368
10.5. Execution environments for active contents 370
10.6. Validation of active contents 382
10.7. Detection of attacks 391
10.8. Conclusion 402
10.9. Bibliography 404
PART 3. Emerging Technologies 409
Chapter 11. Security in Next Generation Mobile Networks 411
Jérôme HÄRRI and Christian BONNET
11.1. Introduction 411
11.2. The SIP 414
11.3. VoIP 418
11.4. IP Multimedia Subsystem (IMS) 422
11.5. 4G security 429
11.6. Confidentiality 431
11.7. Conclusion 433
11.8. Bibliography 434
Chapter 12. Security of IP-Based Mobile Networks 437
Jean-Michel COMBES, Daniel MIGAULT, Julien BOURNELLE, Hakima CHAOUCHI and
Maryline LAURENT-MAKNAVICIUS
12.1. Introduction 437
12.2. Security issues related to mobility 438
12.3. Mobility with MIPv6 442
12.4. Mobility with Mobile IPv4 457
12.5. Mobility with MOBIKE 460
12.6. IP mobility with HIP and NetLMM 462
12.7. Conclusions 467
12.8. Glossary 468
12.9. Bibliography 470
Chapter 13. Security in Ad Hoc Networks 475
Jean-Marie ORSET and Ana CAVALLI
13.1. Introduction 475
13.2. Motivations and application fields 475
13.3. Routing protocols 479
13.4. Attacks to routing protocols 484
13.5. Security mechanisms 490
13.6. Auto-configuration 514
13.7. Conclusion 519
13.8. Bibliography 521
Chapter 14. Key Management in Ad Hoc Networks 525
Mohamed SALAH BOUASSIDA, Isabelle CHRISMENT and Olivier FESTOR
14.1. Introduction 525
14.2. Authentication issue within ad hoc networks 526
14.3. Group key management within ad hoc networks 534
14.4. Discussions 554
14.5. Conclusions 560
14.6. Bibliography 561
Chapter 15. Wireless Sensor Network Security 565
José-Marcos NOGUEIRA, Hao-Chi WONG, Antonio A.F. LOUREIRO, Chakib BEKARA,
Maryline LAURENT-MAKNAVICIUS, Ana Paula RIBEIRO DA SILVA, Sérgio de
OLIVEIRA and Fernando A. TEIXEIRA
15.1. Introduction 565
15.2. Attacks on wireless sensor networks and counter-measures 567
15.3. Prevention mechanisms: authentication and traffic protection 571
15.4. Case study: centralized and passive intruder detection 582
15.5. Case study: decentralized intrusion detection 589
15.6. Case study: intrusion tolerance with multiple routes 598
15.7. Conclusion 607
15.8. Bibliography 609
Chapter 16. Key Management in Wireless Sensor Networks 613
Chakib BEKARA and Maryline LAURENT-MAKNAVICIUS
16.1. Introduction 613
16.2. Introduction to key management 614
16.3. Security needs of WSNs 616
16.4. Key management problems in WSNs 617
16.5. Metric for evaluating key management protocols in WSNs 620
16.6. Classification of key management protocols in WSNs 621
16.7. Notations and assumptions 622
16.8. Broadcast source authentication protocols 623
16.9. Probabilistic key management protocols 627
16.10. Deterministic key management protocols 631
16.11. Hybrid key management protocols 637
16.12. Comparison of key management protocols in WSNs 641
16.13. Conclusion 646
16.14. Bibliography 647
Conclusion 649
List of Authors 653
Index 657
PART 1. Basic Concepts 1
Chapter 1. Introduction to Mobile and Wireless Networks 3
Hakima CHAOUCHI and Tara ALI YAHIYA
1.1. Introduction 3
1.2. Mobile cellular networks 4
1.3. IEEE wireless networks 13
1.4. Mobile Internet networks 32
1.5. Current trends 42
1.6. Conclusions 44
1.7. Bibliography 45
Chapter 2. Vulnerabilities of Wired and Wireless Networks 47
Artur HECKER
2.1. Introduction 47
2.2. Security in the digital age 48
2.3. Threats and risks to telecommunications systems 55
2.4. From wireline vulnerabilities to vulnerabilities in wireless
communications 67
2.5. Conclusions 70
2.6. Bibliography 71
Chapter 3. Fundamental Security Mechanisms 73
Maryline LAURENT-MAKNAVICIUS, Hakima CHAOUCHI and Olivier PAUL
3.1. Introduction 73
3.2. Basics on security 73
3.3. Secure communication protocols and VPN implementation 88
3.4. Authentication 105
3.5. Access control 118
3.6. Conclusions126
3.7. Bibliography 126
Chapter 4. Wi-Fi Security Dedicated Architectures 131
Franck VEYSSET, Laurent BUTTI and Jerôme RAZNIEWSKI
4.1. Introduction 131
4.2. Hot spot architecture: captive portals131
4.3. Wireless intrusion detection systems (WIDS) 137
4.4. Wireless honeypots 145
Chapter 5. Multimedia Content Watermarking 149
Mihai MITREA and Françoise PRÊTEUX
5.1. Introduction 149
5.2. Robust watermarking: a new challenge for the information society 150
5.3. Different constraints for different types of media 157
5.4. Toward the watermarking theoretical model 172
5.5. Discussion and perspectives 188
5.6. Conclusion 195
5.7. Bibliography 196
PART 2. Off-the Shelf Technologies 203
Chapter 6. Bluetooth Security 205
Franck GILLET
6.1. Introduction 205
6.2. Bluetooth technical specification 207
6.3. Bluetooth security 220
6.4. Conclusion 228
6.5. Bibliography 229
Chapter 7. Wi-Fi Security 231
Guy PUJOLLE
7.1. Introduction 231
7.2. Attacks on wireless networks 232
7.3. Security in the IEEE 802.11 standard 235
7.4. Security in 802.1x 245
7.5. Security in 802.11i 249
7.6. Authentication in wireless networks 258
7.7. Layer 3 security mechanisms 263
7.8. Bibliography 270
Chapter 8. WiMAX Security 271
Pascal URIEN, translated by Léa URIEN
8.1. Introduction 271
8.2. WiMAX low layers 276
8.3. Security according to 802.16-2004 283
8.4. Security according to the IEEE-802.16e standard 293
8.5. The role of the smart card in WiMAX infrastructures 308
8.6. Conclusion 311
8.7. Glossary 311
8.8. Bibliography 313
Chapter 9. Security in Mobile Telecommunication Networks 315
Jérôme HÄRRI and Christian BONNET
9.1. Introduction 315
9.2. Signaling 317
9.3. Security in the GSM 326
9.4. GPRS security 338
9.5. 3G security 349
9.6. Network interconnection 356
9.7. Conclusion 357
9.8. Bibliography 358
Chapter 10. Security of Downloadable Applications 361
Pierre CRÉGUT, Isabelle RAVOT and Cuihtlauac ALVARADO
10.1. Introduction 361
10.2. Opening the handset 362
10.3. Security policy 363
10.4. The implementation of a security policy 368
10.5. Execution environments for active contents 370
10.6. Validation of active contents 382
10.7. Detection of attacks 391
10.8. Conclusion 402
10.9. Bibliography 404
PART 3. Emerging Technologies 409
Chapter 11. Security in Next Generation Mobile Networks 411
Jérôme HÄRRI and Christian BONNET
11.1. Introduction 411
11.2. The SIP 414
11.3. VoIP 418
11.4. IP Multimedia Subsystem (IMS) 422
11.5. 4G security 429
11.6. Confidentiality 431
11.7. Conclusion 433
11.8. Bibliography 434
Chapter 12. Security of IP-Based Mobile Networks 437
Jean-Michel COMBES, Daniel MIGAULT, Julien BOURNELLE, Hakima CHAOUCHI and
Maryline LAURENT-MAKNAVICIUS
12.1. Introduction 437
12.2. Security issues related to mobility 438
12.3. Mobility with MIPv6 442
12.4. Mobility with Mobile IPv4 457
12.5. Mobility with MOBIKE 460
12.6. IP mobility with HIP and NetLMM 462
12.7. Conclusions 467
12.8. Glossary 468
12.9. Bibliography 470
Chapter 13. Security in Ad Hoc Networks 475
Jean-Marie ORSET and Ana CAVALLI
13.1. Introduction 475
13.2. Motivations and application fields 475
13.3. Routing protocols 479
13.4. Attacks to routing protocols 484
13.5. Security mechanisms 490
13.6. Auto-configuration 514
13.7. Conclusion 519
13.8. Bibliography 521
Chapter 14. Key Management in Ad Hoc Networks 525
Mohamed SALAH BOUASSIDA, Isabelle CHRISMENT and Olivier FESTOR
14.1. Introduction 525
14.2. Authentication issue within ad hoc networks 526
14.3. Group key management within ad hoc networks 534
14.4. Discussions 554
14.5. Conclusions 560
14.6. Bibliography 561
Chapter 15. Wireless Sensor Network Security 565
José-Marcos NOGUEIRA, Hao-Chi WONG, Antonio A.F. LOUREIRO, Chakib BEKARA,
Maryline LAURENT-MAKNAVICIUS, Ana Paula RIBEIRO DA SILVA, Sérgio de
OLIVEIRA and Fernando A. TEIXEIRA
15.1. Introduction 565
15.2. Attacks on wireless sensor networks and counter-measures 567
15.3. Prevention mechanisms: authentication and traffic protection 571
15.4. Case study: centralized and passive intruder detection 582
15.5. Case study: decentralized intrusion detection 589
15.6. Case study: intrusion tolerance with multiple routes 598
15.7. Conclusion 607
15.8. Bibliography 609
Chapter 16. Key Management in Wireless Sensor Networks 613
Chakib BEKARA and Maryline LAURENT-MAKNAVICIUS
16.1. Introduction 613
16.2. Introduction to key management 614
16.3. Security needs of WSNs 616
16.4. Key management problems in WSNs 617
16.5. Metric for evaluating key management protocols in WSNs 620
16.6. Classification of key management protocols in WSNs 621
16.7. Notations and assumptions 622
16.8. Broadcast source authentication protocols 623
16.9. Probabilistic key management protocols 627
16.10. Deterministic key management protocols 631
16.11. Hybrid key management protocols 637
16.12. Comparison of key management protocols in WSNs 641
16.13. Conclusion 646
16.14. Bibliography 647
Conclusion 649
List of Authors 653
Index 657