《无线网络安全 理论与应用 英文版》PDF下载

  • 购买积分:11 如何计算积分?
  • 作  者:陈磊,季家凰,张自洪主编
  • 出 版 社:北京:高等教育出版社
  • 出版年份:2013
  • ISBN:9787040366808
  • 页数:274 页
图书介绍:为了满足对高品质的无线网络安全方面的研究作品合集的日益增长需求,本书旨在讨论各种不同类型的无线网络之安全。书中讲述相关的安全技术、安全漏洞及潜在的安全威胁,并且介绍对应的安全标准和协议,同时也提供安全问题的解决方案。本书每个章节的各位作者均为中美两国在相关研究领域中的顶尖专家,他们在书中展示了以下各种无线网络之安全的研究发现和结果:无线蜂窝网络、无线局域网、无线城域网、蓝牙网络与通信,车载自组网、无线传感器网络、无线网状网以及无线射频识别。本书的读者包括无线网络、网络安全和信息安全、信息私密性和保障性与数字取证研究领域的大学教授、研究人员、博士生和研究生,以及专业人员。

Chapter 1 Applications,Technologies,and Standards in Secure Wireless NetWorks and Communications 1

Lei Chen 1

1.1 Introduction 1

1.2 Overview of Security in Cellular Networks and Communications 3

1.3 Overview of Security in WLANs 3

1.4 Overview of Security in WMANs 4

1.5 Overview of Security in Bluetooth Networks and Communications 5

1.6 Overview of Security in VANETs 5

1.7 Overview of Security in WSNs 6

1.8 Overview of Security in WMNs 6

1.9 Overview of Security in RFID Networks and Communications 7

1.10 Summary 7

References 8

Chapter 2 Security in Cellular NetWorks and Communications 9

Chuan-Kun Wu 10

2.1 Introduction 10

2.2 Security architecture of cellular communication networks 12

2.3 Security techniques in GSM networks 14

2.4 Security techniques in 3G networks 22

2.5 Security techniques in LTE networks 25

2.6 Security issues in femtocell 33

2.7 Privacy issues in cellular networks 34

2.8 Security issues of mobile devices 35

2.9 Concluding remarks 35

References 36

Chapter 3 Security in Wireless Local Area NetWorks 39

Chao Yang and Guofei Gu 39

3.1 Introduction to WLAN 39

3.2 Current State of WLAN Security 42

3.3 WLAN Communication Security 46

3.4 WLAN Access Point Security 53

3.5 Other WLAN Security Issues 55

3.6 Conclusion 56

References 56

Chapter 4 Security in Wireless Metropolitan Area NetWorks 59

Lei Chen,Narasimha Shashidhar,Shengli Yuan,and Ming Yang 60

4.1 Introduction 60

4.2 Fundamentals of WiMAX 61

4.3 WiMAX security goals and solutions 63

4.4 WiMAX security Vulnerabilities,threats,and countermeasures 72

4.5 Summary 73

References 74

Chapter 5 Security in Bluetooth NetWorks and Communications 77

Lei Chen,Peter Cooper,and Qingzhong Liu 77

5.1 Introduction 77

5.2 Bluetooth Primer 78

5.3 Bluetooth Security Solutions 82

5.4 Bluetooth Security Vulnerabilities,Threats,and Countermeasures 90

5.5 Conclusion 92

References 93

Chapter 6 Security in Vehicular Ad Hoc NetWorks(VANETs) 95

Weidong Yang 95

6.1 Introduction 95

6.2 Security Architecture Framework for Vehicular Ad Hoc Networks 101

6.3 Secure Communication protocols for Vehicular Ad Hoc Network 115

6.4 Privacy Enhancing and Secure Positioning 120

6.5 Conclusion 126

References 127

Chapter 7 Security in Wireless Sensor NetWorks 129

Weiping Wang,Shigeng Zhang.Guihua Duan,and Hong Song 129

7.1 Introduction 129

7.2 Key management in WSNs 131

7.3 Secure routing protocols in WSNs 144

7.4 Location privacy protections in WSNs 153

7.5 Secure data aggregation 161

7.6 Conclusion 172

References 172

Chapter 8 Security in Wireless Sensor NetWorks 179

Ping Li,Limin Sun,Xiangyan Fu,and Lin Ning 179

8.1 Introduction 179

8.2 Overview of security architecture for WSN 181

8.3 Cryptographic Approaches 189

8.4 Resilience on Key Management 195

8.5 Tust Management 200

8.6 Location Privacy 214

8.7 Conclusion 220

References 221

Chapter 9 Security in Wireless Mesh NetWorks 229

Chung-wei Lee 229

9.1 Introduction 229

9.2 Wireless Mesh Networks(WMN)Characteristics 231

9.3 WMN Security Vulnerabilities 234

9.4 WMN Defense Mechanisms 236

9.5 WMN Security Standards and Products 243

9.6 Conclusion 244

References 244

Chapter 10 Security in RFID Networks and Communications 247

Chiu C.Tan and Jie Wu 247

10.1 Introduction 247

10.2 RFID Network Primer 248

10.3 Security Requirements 252

10.4 Hardware Based Solutions 253

10.5 Basic Protocol Based Solutions 254

10.6 Advance Protocol Based Solutions 258

10.7 Commercial RFID Security 260

10.8 Conclusion 264

References 265

Index 269