Wireless Network Security Theories and Applications

This book offers comprehensive discussion of current wireless network security technologies, vulnerabilities and potential threats, introduces and explains corresponding security standards and protocols, and provides detailed solutions to security concerns.

Saved in:
Bibliographic Details
Main Authors Chen, Lei, Ji, Jiahuang, Zhang, Zihong
Format eBook
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin / Heidelberg 2013
Springer Berlin Heidelberg
Springer
Edition1
Subjects
Online AccessGet full text
ISBN9783642365102
3642365108
DOI10.1007/978-3-642-36511-9

Cover

Abstract This book offers comprehensive discussion of current wireless network security technologies, vulnerabilities and potential threats, introduces and explains corresponding security standards and protocols, and provides detailed solutions to security concerns.
AbstractList This book offers comprehensive discussion of current wireless network security technologies, vulnerabilities and potential threats, introduces and explains corresponding security standards and protocols, and provides detailed solutions to security concerns.
Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth Networks and Communications, Vehicular Ad Hoc Networks (VANETs), Wireless Sensor Networks (WSNs), Wireless Mesh Networks (WMNs), and Radio Frequency Identification (RFID). The audience of this book may include professors, researchers, graduate students, and professionals in the areas of Wireless Networks, Network Security and Information Security, Information Privacy and Assurance, as well as Digital Forensics.Lei Chen is an Assistant Professor at Sam Houston State University, USA; Jiahuang Ji is an Associate Professor at Sam Houston State University, USA; Zihong Zhang is a Sr. software engineer at Jacobs Technology, USA under NASA contract.
Author Zhang, Zihong
Ji, Jiahuang
Chen, Lei
Author_xml – sequence: 1
  fullname: Chen, Lei
– sequence: 2
  fullname: Ji, Jiahuang
– sequence: 3
  fullname: Zhang, Zihong
BookMark eNpVkElPwzAQhY1YRCn5Ab31hjiY2nHi5QhRWaQKDiA4Wo49gdAoKXbain9PFi6dy2ievvekNxfopG5qQGhGyQ0lRCyUkJhhnsSY8ZRSrI5Q1GmsUwZBHR_cJD5DE5lKwRMi5DmKQvgm3SjJZcInaPZReqgghPkztPvGr-evYLe-bH8v0WlhqgDR_56i9_vlW_aIVy8PT9ntChvGmSRYFODApQVLjaAKFJXOqthIojjPE5tbFxcWXA4xTcEqbpmljvLEGFHIOE3YFF2PwSasYR--mqoNeldB3jTroA-6dexiZMPGl_UneD1SlOj-Oz2tme54PRh077gaHRvf_GwhtHoItlC33lR6eZdRpqRggv0ByzNhuA
ContentType eBook
Copyright Higher Education Press,Beijing and Springer-Verlag Berlin Heidelberg 2013
Copyright_xml – notice: Higher Education Press,Beijing and Springer-Verlag Berlin Heidelberg 2013
DEWEY 005.8
DOI 10.1007/978-3-642-36511-9
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 9783642365119
3642365116
Edition 1
ExternalDocumentID 9783642365119
209454
EBC1398737
GroupedDBID -EI
-JY
-K2
089
0D6
0DA
20A
38.
A4J
AABBV
AARVG
AAUBL
AAWHR
ABFTD
ABMLC
ABMNI
ACBPT
ACRMW
AEJLV
AEKFX
AETDV
AEZAY
AFJMS
ALMA_UNASSIGNED_HOLDINGS
ARZOH
AZZ
BBABE
CZZ
EFU
I4C
IEZ
MA.
MYL
SBO
TPJZQ
Z5O
Z7R
Z7S
Z7U
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z87
Z88
SAO
Z82
ID FETCH-LOGICAL-a36380-7feded5f35a719e918dc92a80966b4cbcd2fcedbe215ec96c3c1d164aa7f82543
ISBN 9783642365102
3642365108
IngestDate Fri Dec 06 01:21:07 EST 2024
Fri May 23 03:03:43 EDT 2025
Fri May 30 22:37:37 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCallNum_Ident TK5105.5-5105.9
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a36380-7feded5f35a719e918dc92a80966b4cbcd2fcedbe215ec96c3c1d164aa7f82543
OCLC 858764078
PQID EBC1398737
PageCount 279
ParticipantIDs askewsholts_vlebooks_9783642365119
springer_books_10_1007_978_3_642_36511_9
proquest_ebookcentral_EBC1398737
PublicationCentury 2000
PublicationDate 2013
2013-08-23
PublicationDateYYYYMMDD 2013-01-01
2013-08-23
PublicationDate_xml – year: 2013
  text: 2013
PublicationDecade 2010
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin, Heidelberg
PublicationYear 2013
Publisher Springer Berlin / Heidelberg
Springer Berlin Heidelberg
Springer
Publisher_xml – sequence: 0
  name: Springer
– name: Springer Berlin / Heidelberg
– name: Springer Berlin Heidelberg
SSID ssj0000986846
Score 1.9915705
Snippet This book offers comprehensive discussion of current wireless network security technologies, vulnerabilities and potential threats, introduces and explains...
Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the...
SourceID askewsholts
springer
proquest
SourceType Aggregation Database
Publisher
SubjectTerms Communications Engineering, Networks
Computer Communication Networks
Computer networks
Computer Science
Cryptology
Security measures
Telecommunication systems
Subtitle Theories and Applications
TableOfContents 2.5.6 The security limitation of the authentication algorithm in LTE -- 2.6 Security issues in femtocell -- 2.7 Privacy issues in cellular networks -- 2.8 Security issues of mobile devices -- 2.9 Concluding remarks -- References -- Chapter 3 Security in Wireless Local Area Networks -- 3.1 Introduction to WLAN -- 3.1.1 WLAN Background -- 3.1.2 WLAN Architecture -- 3.1.3 WLAN Applications -- 3.2 Current State of WLAN Security -- 3.2.1 WLAN Security Requirements -- 3.2.2 Real-World WLAN Attacks -- 3.3 WLAN Communication Security -- 3.3.1 WEP Protocol -- 3.3.1.1 WEP Framework -- 3.3.1.2 WEP Vulnerabilities -- 3.3.1.3 WEP Attacks -- 3.3.1.4 WEP Cracking Tools -- 3.3.2 WPA Protocol -- 3.3.2.1 WPA Framework -- 3.3.2.2 WPA Vulnerabilities -- 3.3.2.3 WPA Attacks -- 3.3.3 Other Security Protocols -- 3.3.3.1 802.1x -- 3.3.3.2 802.11i (WPA2) -- 3.3.3.3 WAPI -- 3.4 WLAN Access Point Security -- 3.4.1 Rogue Access Points -- 3.4.2 Evil Twin Access Point -- 3.5 Other WLAN Security Issues -- 3.6 Conclusion -- References -- Chapter 4 Security in Wireless Metropolitan Area Networks -- 4.1 Introduction -- 4.2 Fundamentals of WiMAX -- 4.2.1 WiMAX overview -- 4.2.2 WiMAX network topologies -- 4.2.3 The IEEE 802.16 Standards -- 4.3 WiMAX security goals and solutions -- 4.3.1 WiMAX PKI and digital certificates -- 4.3.2 WiMAX security association, key generation and management -- 4.3.3 WiMAX authentication -- 4.3.3.1 BS authenticating SS in PKMv1 -- 4.3.3.2 Mutual authentication in PKMv2 -- 4.3.3.3 Message authentication -- 4.3.4 WiMAX confidentiality -- 4.3.4.1 Key confidentiality -- 4.3.4.2 Data confidentiality -- 4.3.5 WiMAX integrity -- 4.4 WiMAX security vulnerabilities, threats, and countermeasures -- 4.4.1 IEEE 802.16-2004 WiMAX systems -- 4.4.2 All WiMAX systems -- 4.5 Summary -- References -- Chapter 5 Security in Bluetooth Networks and Communications
6.4.2.5 IBC approaches -- 6.4.3 Secure Positioning Scheme -- 6.5 Conclusion -- References -- Chapter 7 Security in Wireless Sensor Networks -- 7.1 Introduction -- 7.2 Key management in WSNs -- 7.2.1 Classification of key management schemes -- 7.2.2 Two well-known key management schemes -- 7.2.3 Typical centralized schemes -- 7.2.4 Typical distributed schemes -- 7.2.4.1 The E-G protocol -- 7.2.4.2 Q-composite: Enhancing security of E-G -- 7.2.4.3 DDHV and RS: enhancing key connectivity of E-G -- 7.2.4.4 Improving the E-G scheme with nodes' geographic information -- 7.2.5 Hierarchical key management schemes -- 7.2.6 Future research directions -- 7.3 Secure routing protocols in WSNs -- 7.3.1 Typical attacks and general defending strategies -- 7.3.1.1 Typical attacks to routing protocols -- 7.3.1.2 Classification and vulnerability of routing protocols in WSNs -- 7.3.1.3 General defending strategies -- 7.3.2 A typical secure routing protocols in WSNs: INSENS -- 7.3.3 Future research directions -- 7.4 Location privacy protections in WSNs -- 7.4.1 Attack models -- 7.4.1.1 Attacks tracing source node locations -- 7.4.1.2 Attacks tracing the sink node location -- 7.4.1.3 Attacks based on traffic analysis -- 7.4.2 General location privacy protection strategies -- 7.4.2.1 Flooding -- 7.4.2.2 Random walk strategies -- 7.4.2.3 Dummy packets strategies -- 7.4.2.4 Fake nodes strategies -- 7.4.3 Future research directions -- 7.5 Secure data aggregation -- 7.5.1 Security requirements in data aggregation protocols -- 7.5.2 Secure data aggregation protocols -- 7.5.2.1 Overview -- 7.5.2.2 Secure data aggregation operating on plain data -- 7.5.2.3 Secure data aggregation operating on encrypted data -- 7.5.3 Future research directions -- 7.6 Conclusion -- Acknowledgments -- References -- Chapter 8 Security in Wireless Sensor Networks -- 8.1 Introduction
5.1 Introduction -- 5.2 Bluetooth Primer -- 5.2.1 Bluetooth Technical Specifications -- 5.2.2 Bluetooth Network Architecture -- 5.2.3 The Bluetooth Controller Stack -- 5.3 Bluetooth Security Solutions -- 5.3.1 Bluetooth Security Goals -- 5.3.2 Bluetooth Security Modes -- 5.3.3 Bluetooth Key Generation and Management -- 5.3.3.1 Link Key Generation in Security Modes 2 and 3 -- 5.3.3.2 Link Key Generation in Security Mode 4 -- 5.3.4 Bluetooth Authentication -- 5.3.5 Bluetooth Confidentiality -- 5.3.6 Bluetooth Trust Levels, Service Levels, and Authorization -- 5.4 Bluetooth Security Vulnerabilities, Threats, and Countermeasures -- 5.4.1 Bluetooth Vulnerabilities -- 5.4.2 Bluetooth Threats and Countermeasures -- 5.5 Conclusion -- References -- Chapter 6 Security in Vehicular Ad Hoc Networks (VANETs) -- 6.1 Introduction -- 6.1.1 Overview -- 6.1.2 VANET Security and Privacy Requirements -- 6.1.3 Security Threats in Vehicular Ad Hoc Networks -- 6.2 Security Architecture Framework for Vehicular Ad Hoc Networks -- 6.2.1 Overview -- 6.2.2 PKI for Vehicular Ad Hoc Networks -- 6.2.3 Trusted Architecture for Vehicular Ad Hoc Networks -- 6.2.3.1 IEEE 1609.2 Security Framework -- 6.2.3.2 Security architecture based on security hardware and the PKI -- 6.2.3.3 Secure VANET communication scheme based on TPMs -- 6.2.4 Key Management and Authentication Scheme -- 6.2.4.1 Key Management -- 6.2.4.2 Authentication Scheme -- 6.3 Secure Communication protocols for Vehicular Ad Hoc Network -- 6.3.1 Overview -- 6.3.2 Secure Beaconing -- 6.3.3 Secure Restricted Flooding/Geocast -- 6.3.4 Secure Geographic Routing -- 6.4 Privacy Enhancing and Secure Positioning -- 6.4.1 Overview -- 6.4.2 Privacy Protection Enhancing Scheme -- 6.4.2.1 Basic pseudonym approaches -- 6.4.2.2 Extended pseudonym approaches -- 6.4.2.3 Symmetric key approaches -- 6.4.2.4 Group signature approaches
8.2 Overview of security architecture for WSN -- 8.2.1 Malicious nodes attacks in WSNs -- 8.2.1.1 Physical layer attacks -- 8.2.1.2 Link layer attacks and countermeasures -- 8.2.1.3 Network and routing layer attacks and countermeasures -- 8.2.1.4 Transport layer attacks and countermeasures -- 8.2.2 Security requirements -- 8.2.2.1 Security goals -- 8.2.2.2 Performance Metrics -- 8.2.3 Hierarchical Architecture for WSN Security -- 8.2.3.1 Three-level security requirements architecture on security mechanisms -- 8.2.3.2 Security architecture (security map) of security issues in WSN -- 8.3 Cryptographic Approaches -- 8.3.1 Communication secrecy -- 8.3.2 Achievements on node authentication -- 8.3.3 Approaches on Asymmetric Cryptographic Algorithms Utilization -- 8.4 Resilience on Key Management -- 8.4.1 Schemes of Key Pre-distribution -- 8.4.2 Malicious behaviors analysis on key management -- 8.4.2.1 Node &amp -- Key Compromises on random key predistribution scheme -- 8.4.2.2 Node and key compromise on multiple-space key pre-distribution scheme -- 8.5 Trust Management -- 8.5.1 Analysis on Node Vulnerabilities -- 8.5.2 Detection schemes on malicious nodes -- 8.5.2.1 Method-based detection strategies -- 8.5.2.2 Measure-based detection strategies -- 8.5.3 Trust Computing -- 8.5.3.1 The procedures of trust computing -- 8.5.3.2 Trust formation algorithms -- 8.5.3.3 Trust Routing for Location-aware Sensor Networks (TRANS) -- 8.5.3.4 A framework for trust-based cluster head election in wireless sensor networks -- 8.5.3.5 Reputation Based Framework for Sensor Networks (RFSN) -- 8.5.3.6 Trust index based security data fusion -- 8.5.3.7 Trust index based fault tolerance for ability data faults in sensor -- 8.5.4 Inference-based misbehavior detection -- 8.6 Location Privacy -- 8.6.1 Flooding mechanisms -- 8.6.2 Random walk strategies
8.6.3 Dummy massages strategies
Cover -- Title Page -- Copyright Page -- Preface -- Table of Contents -- Chapter 1 Applications, Technologies, and Standards in Secure Wireless Networks and Communications -- 1.1 Introduction -- 1.2 Overview of Security in Cellular Networks and Communications -- 1.3 Overview of Security in WLANs -- 1.4 Overview of Security in WMANs -- 1.5 Overview of Security in Bluetooth Networks and Communications -- 1.6 Overview of Security in VANETs -- 1.7 Overview of Security in WSNs -- 1.8 Overview of Security in WMNs -- 1.9 Overview of Security in RFID Networks and Communications -- 1.10 Summary -- References -- Chapter 2 Security in Cellular Networks and Communications -- 2.1 Introduction -- 2.2 Security architecture of cellular communication networks -- 2.2.1 The first generation of cellular communication networks -- 2.2.2 The second generation of cellular communication networks -- 2.2.3 The third generation of cellular communication networks -- 2.2.4 The 3+ generation of wireless communication networks -- 2.3 Security techniques in GSM networks -- 2.3.1 User authentication in GSM -- 2.3.2 The authentication algorithms A3 and A8 -- 2.3.3 The data encryption algorithms A5 -- 2.3.4 The security weakness of the algorithms A5 -- 2.3.5 The algorithms A5/3: a complete new version -- 2.3.6 The inherent security weakness of 2G networks -- 2.4 Security techniques in 3G networks -- 2.4.1 The mutual authentication in 3G networks -- 2.4.2 The confidentiality algorithm f8 and the integrity algorithm f9 -- 2.5 Security techniques in LTE networks -- 2.5.1 The confidentiality and integrity algorithm sets for LTE -- 2.5.2 A new stream cipher ZUC -- 2.5.3 The confidentiality/integrity algorithm set 128-EEA3/128-EIA3 -- 2.5.4 The security flaws and improvements of ZUC -- 2.5.5 The security flaws and an improvement of 128-EIA3
Title Wireless Network Security
URI https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=1398737
http://link.springer.com/10.1007/978-3-642-36511-9
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783642365119&uid=none
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS-QwEB_8eHFf_DjF9VSK-HAgPTZNPx_PZUUW9UlFfAlpMsVF2QW3-nB__U1i0nZl4dCX0KZh2ubXTmYm8wFwWiXEeBlWIS8zY62iX1GySoXciOcSYxYpEzt8fZNe3sXjh-ShrQRqo0vq8rf6uzSu5DuoUh_haqJkv4BsQ5Q66JjwpZYQpvaT8NucuoTbE1PrxPIo68XtzOZ1Yx8fuqCLK5w0PjJ23348kU9v0i1XXYPx4-Rp5rqdEcAUZFgwAngj4JnLkWUyni_Lk2VjNkiASulPjJYy0K7PBI0MzVAWFu1q0fjwjc6HJD3mGc9WYTXLSPFd_zMaX903Fq5Bkack3ZiAGn_P_CPlUfsMfp_ZpfpduGcPenL-TKyeloF6vqABfNq0trLA7RasowkQ2YYVnO7Api-LETguuQO9To7HH9D3WAUOq8BjtQv3F6Pb4WXo6lGEkhObGoRZhRp1UvFEZqzAguVaFZHMSQ1My1iVSkeVQl0iyVGoilRxxTTpo1JmldHE-R6sTWdT3IeA6MioZIg5slgPUjrUCel6EdMJx7jqw0nn5cX7i907n4vO7LGiD4GfE2GvO4de0WLTh19-rsQHBZ-nmigJLoiWsMREcfB_aj9ho_36DmGtfn3DIxLK6vLYof8PxXQu8g
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Wireless+Network+Security&rft.au=Chen%2C+Lei&rft.au=Ji%2C+Jiahuang&rft.au=Zhang%2C+Zihong&rft.date=2013-01-01&rft.pub=Springer+Berlin+%2F+Heidelberg&rft.isbn=9783642365102&rft_id=info:doi/10.1007%2F978-3-642-36511-9&rft.externalDocID=EBC1398737
thumbnail_m http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97836423%2F9783642365119.jpg
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fmedia.springernature.com%2Fw306%2Fspringer-static%2Fcover-hires%2Fbook%2F978-3-642-36511-9