Beställningsvara. Skickas inom 11-20 vardagar. Fri frakt för medlemmar vid köp för minst 249 kr.
This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This material will be of invaluable use to all those working in the network security field, and especially to the many people entering the field. The next area of focus is on the security issues and available solutions associated with off-the-shelf wireless and mobile technologies such as Bluetooth, WiFi, WiMax, 2G, and 3G. There is coverage of the security techniques used to protect applications downloaded by mobile terminals through mobile cellular networks, and finally the book addresses security issues and solutions in emerging wireless and mobile technologies such as ad hoc and sensor networks, cellular 4G and IMS networks.
Hakima Chaouchi is an Assistant Professor at the French National Institute of Telecommunications (INT). Maryline Laurent-Maknavicius is Professor at the French National Institute of Telecommunications (INT) and is the head of the VIS research security team.
Introduction. xviiPART 1. Basic Concepts 1Chapter 1. Introduction to Mobile and Wireless Networks 3Hakima CHAOUCHI and Tara ALI YAHIYA1.1. Introduction 31.2. Mobile cellular networks 41.3. IEEE wireless networks 131.4. Mobile Internet networks 321.5. Current trends 421.6. Conclusions 441.7. Bibliography 45Chapter 2. Vulnerabilities of Wired and Wireless Networks 47Artur HECKER2.1. Introduction 472.2. Security in the digital age 482.3. Threats and risks to telecommunications systems 552.4. From wireline vulnerabilities to vulnerabilities in wireless communications 672.5. Conclusions 702.6. Bibliography 71Chapter 3. Fundamental Security Mechanisms 73Maryline LAURENT-MAKNAVICIUS, Hakima CHAOUCHI and Olivier PAUL3.1. Introduction 733.2. Basics on security 733.3. Secure communication protocols and VPN implementation 883.4. Authentication 1053.5. Access control 1183.6. Conclusions1263.7. Bibliography 126 Chapter 4. Wi-Fi Security Dedicated Architectures 131Franck VEYSSET, Laurent BUTTI and Jerôme RAZNIEWSKI4.1. Introduction 1314.2. Hot spot architecture: captive portals1314.3. Wireless intrusion detection systems (WIDS) 1374.4. Wireless honeypots 145Chapter 5. Multimedia Content Watermarking 149Mihai MITREA and Françoise PRÊTEUX5.1. Introduction 1495.2. Robust watermarking: a new challenge for the information society 1505.3. Different constraints for different types of media 1575.4. Toward the watermarking theoretical model 1725.5. Discussion and perspectives 1885.6. Conclusion 1955.7. Bibliography 196PART 2. Off-the Shelf Technologies 203Chapter 6. Bluetooth Security 205Franck GILLET6.1. Introduction 2056.2. Bluetooth technical specification 2076.3. Bluetooth security 2206.4. Conclusion 2286.5. Bibliography 229Chapter 7. Wi-Fi Security 231Guy PUJOLLE7.1. Introduction 2317.2. Attacks on wireless networks 2327.3. Security in the IEEE 802.11 standard 2357.4. Security in 802.1x 2457.5. Security in 802.11i 2497.6. Authentication in wireless networks 2587.7. Layer 3 security mechanisms 2637.8. Bibliography 270Chapter 8. WiMAX Security 271Pascal URIEN, translated by Léa URIEN8.1. Introduction 2718.2. WiMAX low layers 2768.3. Security according to 802.16-2004 2838.4. Security according to the IEEE-802.16e standard 2938.5. The role of the smart card in WiMAX infrastructures 3088.6. Conclusion 3118.7. Glossary 3118.8. Bibliography 313Chapter 9. Security in Mobile Telecommunication Networks 315Jérôme HÄRRI and Christian BONNET9.1. Introduction 3159.2. Signaling 3179.3. Security in the GSM 3269.4. GPRS security 3389.5. 3G security 3499.6. Network interconnection 3569.7. Conclusion 3579.8. Bibliography 358Chapter 10. Security of Downloadable Applications 361Pierre CRÉGUT, Isabelle RAVOT and Cuihtlauac ALVARADO10.1. Introduction 36110.2. Opening the handset 36210.3. Security policy 36310.4. The implementation of a security policy 36810.5. Execution environments for active contents 37010.6. Validation of active contents 38210.7. Detection of attacks 39110.8. Conclusion 40210.9. Bibliography 404PART 3. Emerging Technologies 409Chapter 11. Security in Next Generation Mobile Networks 411Jérôme HÄRRI and Christian BONNET11.1. Introduction 41111.2. The SIP 41411.3. VoIP 41811.4. IP Multimedia Subsystem (IMS) 42211.5. 4G security 42911.6. Confidentiality 43111.7. Conclusion 43311.8. Bibliography 434Chapter 12. Security of IP-Based Mobile Networks 437Jean-Michel COMBES, Daniel MIGAULT, Julien BOURNELLE, Hakima CHAOUCHI and Maryline LAURENT-MAKNAVICIUS12.1. Introduction 43712.2. Security issues related to mobility 43812.3. Mobility with MIPv6 44212.4. Mobility with Mobile IPv4 45712.5. Mobility with MOBIKE 46012.6. IP mobility with HIP and NetLMM 46212.7. Conclusions 46712.8. Glossary 46812.9. Bibliography 470Chapter 13. Security in Ad Hoc Networks 475Jean-Marie ORSET and Ana CAVALLI13.1. Introduction 47513.2. Motivations and application fields 47513.3. Routing protocols 47913.4. Attacks to routing protocols 48413.5. Security mechanisms 49013.6. Auto-configuration 51413.7. Conclusion 51913.8. Bibliography 521Chapter 14. Key Management in Ad Hoc Networks 525Mohamed SALAH BOUASSIDA, Isabelle CHRISMENT and Olivier FESTOR14.1. Introduction 52514.2. Authentication issue within ad hoc networks 52614.3. Group key management within ad hoc networks 53414.4. Discussions 55414.5. Conclusions 56014.6. Bibliography 561Chapter 15. Wireless Sensor Network Security 565José-Marcos NOGUEIRA, Hao-Chi WONG, Antonio A.F. LOUREIRO, Chakib BEKARA, Maryline LAURENT-MAKNAVICIUS, Ana Paula RIBEIRO DA SILVA, Sérgio de OLIVEIRA and Fernando A. TEIXEIRA15.1. Introduction 56515.2. Attacks on wireless sensor networks and counter-measures 56715.3. Prevention mechanisms: authentication and traffic protection 57115.4. Case study: centralized and passive intruder detection 58215.5. Case study: decentralized intrusion detection 58915.6. Case study: intrusion tolerance with multiple routes 59815.7. Conclusion 60715.8. Bibliography 609Chapter 16. Key Management in Wireless Sensor Networks 613Chakib BEKARA and Maryline LAURENT-MAKNAVICIUS16.1. Introduction 61316.2. Introduction to key management 61416.3. Security needs of WSNs 61616.4. Key management problems in WSNs 61716.5. Metric for evaluating key management protocols in WSNs 62016.6. Classification of key management protocols in WSNs 62116.7. Notations and assumptions 62216.8. Broadcast source authentication protocols 62316.9. Probabilistic key management protocols 62716.10. Deterministic key management protocols 63116.11. Hybrid key management protocols 63716.12. Comparison of key management protocols in WSNs 64116.13. Conclusion 64616.14. Bibliography 647Conclusion 649List of Authors 653Index 657
Jeffrey Beatty, Susan Samuelson, Patricia Abril, Jeffrey (Boston University Questrom School of Business) Beatty, Susan (Boston University Questrom School of Business) Samuelson, Patricia (University of Miami Business School) Abril