Wireless Network Security Theories and Applications
This book offers comprehensive discussion of current wireless network security technologies, vulnerabilities and potential threats, introduces and explains corresponding security standards and protocols, and provides detailed solutions to security concerns.
Saved in:
Main Authors | , , |
---|---|
Format | eBook |
Language | English |
Published |
Berlin, Heidelberg
Springer Berlin / Heidelberg
2013
Springer Berlin Heidelberg Springer |
Edition | 1 |
Subjects | |
Online Access | Get full text |
ISBN | 9783642365102 3642365108 |
DOI | 10.1007/978-3-642-36511-9 |
Cover
Loading…
Table of Contents:
- 2.5.6 The security limitation of the authentication algorithm in LTE -- 2.6 Security issues in femtocell -- 2.7 Privacy issues in cellular networks -- 2.8 Security issues of mobile devices -- 2.9 Concluding remarks -- References -- Chapter 3 Security in Wireless Local Area Networks -- 3.1 Introduction to WLAN -- 3.1.1 WLAN Background -- 3.1.2 WLAN Architecture -- 3.1.3 WLAN Applications -- 3.2 Current State of WLAN Security -- 3.2.1 WLAN Security Requirements -- 3.2.2 Real-World WLAN Attacks -- 3.3 WLAN Communication Security -- 3.3.1 WEP Protocol -- 3.3.1.1 WEP Framework -- 3.3.1.2 WEP Vulnerabilities -- 3.3.1.3 WEP Attacks -- 3.3.1.4 WEP Cracking Tools -- 3.3.2 WPA Protocol -- 3.3.2.1 WPA Framework -- 3.3.2.2 WPA Vulnerabilities -- 3.3.2.3 WPA Attacks -- 3.3.3 Other Security Protocols -- 3.3.3.1 802.1x -- 3.3.3.2 802.11i (WPA2) -- 3.3.3.3 WAPI -- 3.4 WLAN Access Point Security -- 3.4.1 Rogue Access Points -- 3.4.2 Evil Twin Access Point -- 3.5 Other WLAN Security Issues -- 3.6 Conclusion -- References -- Chapter 4 Security in Wireless Metropolitan Area Networks -- 4.1 Introduction -- 4.2 Fundamentals of WiMAX -- 4.2.1 WiMAX overview -- 4.2.2 WiMAX network topologies -- 4.2.3 The IEEE 802.16 Standards -- 4.3 WiMAX security goals and solutions -- 4.3.1 WiMAX PKI and digital certificates -- 4.3.2 WiMAX security association, key generation and management -- 4.3.3 WiMAX authentication -- 4.3.3.1 BS authenticating SS in PKMv1 -- 4.3.3.2 Mutual authentication in PKMv2 -- 4.3.3.3 Message authentication -- 4.3.4 WiMAX confidentiality -- 4.3.4.1 Key confidentiality -- 4.3.4.2 Data confidentiality -- 4.3.5 WiMAX integrity -- 4.4 WiMAX security vulnerabilities, threats, and countermeasures -- 4.4.1 IEEE 802.16-2004 WiMAX systems -- 4.4.2 All WiMAX systems -- 4.5 Summary -- References -- Chapter 5 Security in Bluetooth Networks and Communications
- 6.4.2.5 IBC approaches -- 6.4.3 Secure Positioning Scheme -- 6.5 Conclusion -- References -- Chapter 7 Security in Wireless Sensor Networks -- 7.1 Introduction -- 7.2 Key management in WSNs -- 7.2.1 Classification of key management schemes -- 7.2.2 Two well-known key management schemes -- 7.2.3 Typical centralized schemes -- 7.2.4 Typical distributed schemes -- 7.2.4.1 The E-G protocol -- 7.2.4.2 Q-composite: Enhancing security of E-G -- 7.2.4.3 DDHV and RS: enhancing key connectivity of E-G -- 7.2.4.4 Improving the E-G scheme with nodes' geographic information -- 7.2.5 Hierarchical key management schemes -- 7.2.6 Future research directions -- 7.3 Secure routing protocols in WSNs -- 7.3.1 Typical attacks and general defending strategies -- 7.3.1.1 Typical attacks to routing protocols -- 7.3.1.2 Classification and vulnerability of routing protocols in WSNs -- 7.3.1.3 General defending strategies -- 7.3.2 A typical secure routing protocols in WSNs: INSENS -- 7.3.3 Future research directions -- 7.4 Location privacy protections in WSNs -- 7.4.1 Attack models -- 7.4.1.1 Attacks tracing source node locations -- 7.4.1.2 Attacks tracing the sink node location -- 7.4.1.3 Attacks based on traffic analysis -- 7.4.2 General location privacy protection strategies -- 7.4.2.1 Flooding -- 7.4.2.2 Random walk strategies -- 7.4.2.3 Dummy packets strategies -- 7.4.2.4 Fake nodes strategies -- 7.4.3 Future research directions -- 7.5 Secure data aggregation -- 7.5.1 Security requirements in data aggregation protocols -- 7.5.2 Secure data aggregation protocols -- 7.5.2.1 Overview -- 7.5.2.2 Secure data aggregation operating on plain data -- 7.5.2.3 Secure data aggregation operating on encrypted data -- 7.5.3 Future research directions -- 7.6 Conclusion -- Acknowledgments -- References -- Chapter 8 Security in Wireless Sensor Networks -- 8.1 Introduction
- 5.1 Introduction -- 5.2 Bluetooth Primer -- 5.2.1 Bluetooth Technical Specifications -- 5.2.2 Bluetooth Network Architecture -- 5.2.3 The Bluetooth Controller Stack -- 5.3 Bluetooth Security Solutions -- 5.3.1 Bluetooth Security Goals -- 5.3.2 Bluetooth Security Modes -- 5.3.3 Bluetooth Key Generation and Management -- 5.3.3.1 Link Key Generation in Security Modes 2 and 3 -- 5.3.3.2 Link Key Generation in Security Mode 4 -- 5.3.4 Bluetooth Authentication -- 5.3.5 Bluetooth Confidentiality -- 5.3.6 Bluetooth Trust Levels, Service Levels, and Authorization -- 5.4 Bluetooth Security Vulnerabilities, Threats, and Countermeasures -- 5.4.1 Bluetooth Vulnerabilities -- 5.4.2 Bluetooth Threats and Countermeasures -- 5.5 Conclusion -- References -- Chapter 6 Security in Vehicular Ad Hoc Networks (VANETs) -- 6.1 Introduction -- 6.1.1 Overview -- 6.1.2 VANET Security and Privacy Requirements -- 6.1.3 Security Threats in Vehicular Ad Hoc Networks -- 6.2 Security Architecture Framework for Vehicular Ad Hoc Networks -- 6.2.1 Overview -- 6.2.2 PKI for Vehicular Ad Hoc Networks -- 6.2.3 Trusted Architecture for Vehicular Ad Hoc Networks -- 6.2.3.1 IEEE 1609.2 Security Framework -- 6.2.3.2 Security architecture based on security hardware and the PKI -- 6.2.3.3 Secure VANET communication scheme based on TPMs -- 6.2.4 Key Management and Authentication Scheme -- 6.2.4.1 Key Management -- 6.2.4.2 Authentication Scheme -- 6.3 Secure Communication protocols for Vehicular Ad Hoc Network -- 6.3.1 Overview -- 6.3.2 Secure Beaconing -- 6.3.3 Secure Restricted Flooding/Geocast -- 6.3.4 Secure Geographic Routing -- 6.4 Privacy Enhancing and Secure Positioning -- 6.4.1 Overview -- 6.4.2 Privacy Protection Enhancing Scheme -- 6.4.2.1 Basic pseudonym approaches -- 6.4.2.2 Extended pseudonym approaches -- 6.4.2.3 Symmetric key approaches -- 6.4.2.4 Group signature approaches
- 8.2 Overview of security architecture for WSN -- 8.2.1 Malicious nodes attacks in WSNs -- 8.2.1.1 Physical layer attacks -- 8.2.1.2 Link layer attacks and countermeasures -- 8.2.1.3 Network and routing layer attacks and countermeasures -- 8.2.1.4 Transport layer attacks and countermeasures -- 8.2.2 Security requirements -- 8.2.2.1 Security goals -- 8.2.2.2 Performance Metrics -- 8.2.3 Hierarchical Architecture for WSN Security -- 8.2.3.1 Three-level security requirements architecture on security mechanisms -- 8.2.3.2 Security architecture (security map) of security issues in WSN -- 8.3 Cryptographic Approaches -- 8.3.1 Communication secrecy -- 8.3.2 Achievements on node authentication -- 8.3.3 Approaches on Asymmetric Cryptographic Algorithms Utilization -- 8.4 Resilience on Key Management -- 8.4.1 Schemes of Key Pre-distribution -- 8.4.2 Malicious behaviors analysis on key management -- 8.4.2.1 Node & -- Key Compromises on random key predistribution scheme -- 8.4.2.2 Node and key compromise on multiple-space key pre-distribution scheme -- 8.5 Trust Management -- 8.5.1 Analysis on Node Vulnerabilities -- 8.5.2 Detection schemes on malicious nodes -- 8.5.2.1 Method-based detection strategies -- 8.5.2.2 Measure-based detection strategies -- 8.5.3 Trust Computing -- 8.5.3.1 The procedures of trust computing -- 8.5.3.2 Trust formation algorithms -- 8.5.3.3 Trust Routing for Location-aware Sensor Networks (TRANS) -- 8.5.3.4 A framework for trust-based cluster head election in wireless sensor networks -- 8.5.3.5 Reputation Based Framework for Sensor Networks (RFSN) -- 8.5.3.6 Trust index based security data fusion -- 8.5.3.7 Trust index based fault tolerance for ability data faults in sensor -- 8.5.4 Inference-based misbehavior detection -- 8.6 Location Privacy -- 8.6.1 Flooding mechanisms -- 8.6.2 Random walk strategies
- 8.6.3 Dummy massages strategies
- Cover -- Title Page -- Copyright Page -- Preface -- Table of Contents -- Chapter 1 Applications, Technologies, and Standards in Secure Wireless Networks and Communications -- 1.1 Introduction -- 1.2 Overview of Security in Cellular Networks and Communications -- 1.3 Overview of Security in WLANs -- 1.4 Overview of Security in WMANs -- 1.5 Overview of Security in Bluetooth Networks and Communications -- 1.6 Overview of Security in VANETs -- 1.7 Overview of Security in WSNs -- 1.8 Overview of Security in WMNs -- 1.9 Overview of Security in RFID Networks and Communications -- 1.10 Summary -- References -- Chapter 2 Security in Cellular Networks and Communications -- 2.1 Introduction -- 2.2 Security architecture of cellular communication networks -- 2.2.1 The first generation of cellular communication networks -- 2.2.2 The second generation of cellular communication networks -- 2.2.3 The third generation of cellular communication networks -- 2.2.4 The 3+ generation of wireless communication networks -- 2.3 Security techniques in GSM networks -- 2.3.1 User authentication in GSM -- 2.3.2 The authentication algorithms A3 and A8 -- 2.3.3 The data encryption algorithms A5 -- 2.3.4 The security weakness of the algorithms A5 -- 2.3.5 The algorithms A5/3: a complete new version -- 2.3.6 The inherent security weakness of 2G networks -- 2.4 Security techniques in 3G networks -- 2.4.1 The mutual authentication in 3G networks -- 2.4.2 The confidentiality algorithm f8 and the integrity algorithm f9 -- 2.5 Security techniques in LTE networks -- 2.5.1 The confidentiality and integrity algorithm sets for LTE -- 2.5.2 A new stream cipher ZUC -- 2.5.3 The confidentiality/integrity algorithm set 128-EEA3/128-EIA3 -- 2.5.4 The security flaws and improvements of ZUC -- 2.5.5 The security flaws and an improvement of 128-EIA3