Chapter 1 Applications,Technologies,and Standards in Secure Wireless NetWorks and Communications 1
Lei Chen 1
1.1 Introduction 1
1.2 Overview of Security in Cellular Networks and Communications 3
1.3 Overview of Security in WLANs 3
1.4 Overview of Security in WMANs 4
1.5 Overview of Security in Bluetooth Networks and Communications 5
1.6 Overview of Security in VANETs 5
1.7 Overview of Security in WSNs 6
1.8 Overview of Security in WMNs 6
1.9 Overview of Security in RFID Networks and Communications 7
1.10 Summary 7
References 8
Chapter 2 Security in Cellular NetWorks and Communications 9
Chuan-Kun Wu 10
2.1 Introduction 10
2.2 Security architecture of cellular communication networks 12
2.3 Security techniques in GSM networks 14
2.4 Security techniques in 3G networks 22
2.5 Security techniques in LTE networks 25
2.6 Security issues in femtocell 33
2.7 Privacy issues in cellular networks 34
2.8 Security issues of mobile devices 35
2.9 Concluding remarks 35
References 36
Chapter 3 Security in Wireless Local Area NetWorks 39
Chao Yang and Guofei Gu 39
3.1 Introduction to WLAN 39
3.2 Current State of WLAN Security 42
3.3 WLAN Communication Security 46
3.4 WLAN Access Point Security 53
3.5 Other WLAN Security Issues 55
3.6 Conclusion 56
References 56
Chapter 4 Security in Wireless Metropolitan Area NetWorks 59
Lei Chen,Narasimha Shashidhar,Shengli Yuan,and Ming Yang 60
4.1 Introduction 60
4.2 Fundamentals of WiMAX 61
4.3 WiMAX security goals and solutions 63
4.4 WiMAX security Vulnerabilities,threats,and countermeasures 72
4.5 Summary 73
References 74
Chapter 5 Security in Bluetooth NetWorks and Communications 77
Lei Chen,Peter Cooper,and Qingzhong Liu 77
5.1 Introduction 77
5.2 Bluetooth Primer 78
5.3 Bluetooth Security Solutions 82
5.4 Bluetooth Security Vulnerabilities,Threats,and Countermeasures 90
5.5 Conclusion 92
References 93
Chapter 6 Security in Vehicular Ad Hoc NetWorks(VANETs) 95
Weidong Yang 95
6.1 Introduction 95
6.2 Security Architecture Framework for Vehicular Ad Hoc Networks 101
6.3 Secure Communication protocols for Vehicular Ad Hoc Network 115
6.4 Privacy Enhancing and Secure Positioning 120
6.5 Conclusion 126
References 127
Chapter 7 Security in Wireless Sensor NetWorks 129
Weiping Wang,Shigeng Zhang.Guihua Duan,and Hong Song 129
7.1 Introduction 129
7.2 Key management in WSNs 131
7.3 Secure routing protocols in WSNs 144
7.4 Location privacy protections in WSNs 153
7.5 Secure data aggregation 161
7.6 Conclusion 172
References 172
Chapter 8 Security in Wireless Sensor NetWorks 179
Ping Li,Limin Sun,Xiangyan Fu,and Lin Ning 179
8.1 Introduction 179
8.2 Overview of security architecture for WSN 181
8.3 Cryptographic Approaches 189
8.4 Resilience on Key Management 195
8.5 Tust Management 200
8.6 Location Privacy 214
8.7 Conclusion 220
References 221
Chapter 9 Security in Wireless Mesh NetWorks 229
Chung-wei Lee 229
9.1 Introduction 229
9.2 Wireless Mesh Networks(WMN)Characteristics 231
9.3 WMN Security Vulnerabilities 234
9.4 WMN Defense Mechanisms 236
9.5 WMN Security Standards and Products 243
9.6 Conclusion 244
References 244
Chapter 10 Security in RFID Networks and Communications 247
Chiu C.Tan and Jie Wu 247
10.1 Introduction 247
10.2 RFID Network Primer 248
10.3 Security Requirements 252
10.4 Hardware Based Solutions 253
10.5 Basic Protocol Based Solutions 254
10.6 Advance Protocol Based Solutions 258
10.7 Commercial RFID Security 260
10.8 Conclusion 264
References 265
Index 269