skip to content
Wireless Network Security : Theories and Applications Preview this item
ClosePreview this item
Checking...

Wireless Network Security : Theories and Applications

Author: Lei Chen; Jiahuang Ji; Zihong Zhang
Publisher: Dordrecht : Springer, 2013.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Lei Chen; Jiahuang Ji; Zihong Zhang
ISBN: 9783642365119 3642365116
OCLC Number: 859749973
Notes: Description based upon print version of record.
Description: 1 online resource (279 p.)
Contents: Cover; Title Page; Copyright Page; Preface; Table of Contents; Chapter 1 Applications, Technologies, and Standards in Secure Wireless Networks and Communications; 1.1 Introduction; 1.2 Overview of Security in Cellular Networks and Communications; 1.3 Overview of Security in WLANs; 1.4 Overview of Security in WMANs; 1.5 Overview of Security in Bluetooth Networks and Communications; 1.6 Overview of Security in VANETs; 1.7 Overview of Security in WSNs; 1.8 Overview of Security in WMNs; 1.9 Overview of Security in RFID Networks and Communications; 1.10 Summary; References Chapter 2 Security in Cellular Networks and Communications2.1 Introduction; 2.2 Security architecture of cellular communication networks; 2.2.1 The first generation of cellular communication networks; 2.2.2 The second generation of cellular communication networks; 2.2.3 The third generation of cellular communication networks; 2.2.4 The 3+ generation of wireless communication networks; 2.3 Security techniques in GSM networks; 2.3.1 User authentication in GSM; 2.3.2 The authentication algorithms A3 and A8; 2.3.3 The data encryption algorithms A5; 2.3.4 The security weakness of the algorithms A5 2.3.5 The algorithms A5/3: a complete new version2.3.6 The inherent security weakness of 2G networks; 2.4 Security techniques in 3G networks; 2.4.1 The mutual authentication in 3G networks; 2.4.2 The confidentiality algorithm f8 and the integrity algorithm f9; 2.5 Security techniques in LTE networks; 2.5.1 The confidentiality and integrity algorithm sets for LTE; 2.5.2 A new stream cipher ZUC; 2.5.3 The confidentiality/integrity algorithm set 128-EEA3/128-EIA3; 2.5.4 The security flaws and improvements of ZUC; 2.5.5 The security flaws and an improvement of 128-EIA3 2.5.6 The security limitation of the authentication algorithm in LTE2.6 Security issues in femtocell; 2.7 Privacy issues in cellular networks; 2.8 Security issues of mobile devices; 2.9 Concluding remarks; References; Chapter 3 Security in Wireless Local Area Networks; 3.1 Introduction to WLAN; 3.1.1 WLAN Background; 3.1.2 WLAN Architecture; 3.1.3 WLAN Applications; 3.2 Current State of WLAN Security; 3.2.1 WLAN Security Requirements; 3.2.2 Real-World WLAN Attacks; 3.3 WLAN Communication Security; 3.3.1 WEP Protocol; 3.3.1.1 WEP Framework; 3.3.1.2 WEP Vulnerabilities; 3.3.1.3 WEP Attacks 3.3.1.4 WEP Cracking Tools3.3.2 WPA Protocol; 3.3.2.1 WPA Framework; 3.3.2.2 WPA Vulnerabilities; 3.3.2.3 WPA Attacks; 3.3.3 Other Security Protocols; 3.3.3.1 802.1x; 3.3.3.2 802.11i (WPA2); 3.3.3.3 WAPI; 3.4 WLAN Access Point Security; 3.4.1 Rogue Access Points; 3.4.2 Evil Twin Access Point; 3.5 Other WLAN Security Issues; 3.6 Conclusion; References; Chapter 4 Security in Wireless Metropolitan Area Networks; 4.1 Introduction; 4.2 Fundamentals of WiMAX; 4.2.1 WiMAX overview; 4.2.2 WiMAX network topologies; 4.2.3 The IEEE 802.16 Standards; 4.3 WiMAX security goals and solutions

Abstract:

Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/859749973>
library:oclcnum"859749973"
library:placeOfPublication
rdf:typeschema:Book
rdf:typeschema:MediaObject
rdf:valueUnknown value: dct
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:creator
schema:datePublished"2013"
schema:description"Cover; Title Page; Copyright Page; Preface; Table of Contents; Chapter 1 Applications, Technologies, and Standards in Secure Wireless Networks and Communications; 1.1 Introduction; 1.2 Overview of Security in Cellular Networks and Communications; 1.3 Overview of Security in WLANs; 1.4 Overview of Security in WMANs; 1.5 Overview of Security in Bluetooth Networks and Communications; 1.6 Overview of Security in VANETs; 1.7 Overview of Security in WSNs; 1.8 Overview of Security in WMNs; 1.9 Overview of Security in RFID Networks and Communications; 1.10 Summary; References"@en
schema:description"Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth"@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1781759964>
schema:genre"Electronic books"@en
schema:inLanguage"en"
schema:name"Wireless Network Security Theories and Applications"@en
schema:publication
schema:publisher
schema:url<http://msvu.eblib.com/patron/FullRecord.aspx?p=1398737>
schema:workExample
wdrs:describedby

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.