did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781580535205

Wireless Communications Security

by ; ;
  • ISBN13:

    9781580535205

  • ISBN10:

    1580535208

  • Format: Hardcover
  • Copyright: 2005-11-30
  • Publisher: Artech House on Demand
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $115.00 Save up to $19.37
  • Digital
    $95.63
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers you a broad overview of wireless security, so you can choose the methods and techniques that are most appropriate for your projects. You gain a solid understanding of critical cryptography techniques, such as private/public key encryption, digital signatures, and block and stream ciphers. You discover how to evaluate cryptography deployment impact on current wireless network architectures, and learn how to implement an effective cryptography architecture for any organization.

Author Biography

Hideki Imai is a full professor at the Institute of Industrial Science, University of Tokyo.

Table of Contents

Preface xi
Introduction
1(4)
Cryptography
5(36)
Introduction
5(1)
Basic Concepts
5(4)
Ciphertext and Plaintext
5(1)
Types of Cryptosystems
6(1)
Goals of a Cryptosystem
7(1)
Security
8(1)
Symmetric Encryption Schemes
9(1)
Perfect Secrecy: The One-Time Pad
9(2)
Block Ciphers
11(8)
Permutation
11(1)
Substitution
12(1)
Diffusion/Confusion
13(1)
SP Networks
14(1)
Basic Structure
14(1)
Modes of Use
15(2)
DES
17(1)
AES
18(1)
Stream Ciphers
19(2)
Advantages
20(1)
Security Remarks
20(1)
Some Examples
21(1)
Asymmetric Cryptosystems and Digital Signatures
21(20)
Public-Key Encryption
22(1)
Public Key Infrastructure (PKI) and Certificate Authorities (CA)
23(2)
Mathematical Background
25(2)
Diffie-Hellman Key Agreement
27(1)
RSA Cryptosystem
28(1)
ElGamal Cryptosystem
29(2)
Necessary Security for Practical Public Key Encryption Systems
31(1)
Digital Signature
32(1)
Mathematical Background
33(2)
RSA Signature Scheme
35(1)
Digital Signature Algorithm (DSA)
36(1)
Necessary Security for Practical Digital Signature Systems
36(2)
References
38(3)
Security Features in Wireless Environment
41(14)
Introduction
41(1)
Mobile Network Environment
42(2)
General Security Threats of a Network
44(1)
Limitations of Mobile Environment
45(1)
Mobility and Security
46(1)
Attacks in Mobile Environment
46(3)
Nuisance Attack
47(1)
Impersonation Attack
48(1)
Interception Attack
48(1)
Replay Attack
48(1)
Parallel Session Attack
48(1)
Security Issues in Mobile Environment
49(6)
Authentication
49(1)
Anonymity
50(2)
Device Vulnerability
52(1)
Domain Boundary Crossing
52(1)
References
53(2)
Standard Protocols
55(36)
IEEE 802.11
55(17)
Brief History
55(1)
IEEE802.11 Architecture
56(4)
IEEE 802.11 Layers
60(2)
Security of IEEE 802.11
62(7)
Key Management
69(1)
Weaknesses of WEP
70(2)
Bluetooth
72(19)
Bluetooth Overview
72(1)
Brief History
73(1)
Benefits
74(2)
Bluetooth Architecture and Components
76(2)
Security of Bluetooth
78(11)
Problems in the Security of Bluetooth
89(1)
Reference
90(1)
Security in 2G Systems
91(40)
GSM System
92(14)
Introduction
92(1)
Architecture of the GSM Network
93(3)
GSM Security Features
96(7)
Attacks on GSM Security
103(3)
I-mode Introduction
106(10)
Introduction
106(1)
I-mode System Overview
107(1)
SSL Overview
108(2)
Protocol Stack
110(4)
HTTP Tunneling Protocol
114(2)
Postscript
116(1)
CDPD
116(15)
Introduction
116(2)
Basic Idea
118(1)
Basic Infrastructure
119(3)
How a CDPD Connection Works
122(3)
CDPD Security
125(4)
References
129(2)
Security in 3G and 4G Systems
131(12)
3G Wireless Communications Systems
131(2)
Third Generation Partnership Project (3GPP)
133(1)
3GPP Security Objectives
133(1)
3G Security Architecture
134(3)
Network Access Security
135(1)
Network Domain Security
136(1)
User Domain Security
136(1)
Provider-User Link Security
136(1)
Visibility and Configurability of Security
137(1)
Authentication and Key Agreement (AKA) in 3GPP
137(1)
Confidentiality and Integrity
138(3)
Confidentiality
139(1)
Data Integrity
140(1)
4G Wireless Communications Systems
141(2)
References
142(1)
Wireless Application Protocol (WAP)
143(32)
Introduction
143(1)
WAP Protocol Stack
144(3)
WAP PKI Model
147(9)
WTLS Class 2
148(4)
WTLS Class 3 and Sign Text
152(4)
Cipher Suite in WTLS
156(7)
Key Exchange Suite
156(4)
Elliptic Curve Parameters in WTLS
160(1)
Bulk Encryption and MAC Suite
161(2)
WAP-Profiled TLS
163(6)
Cipher Suites
164(3)
Session ID and Session Resume
167(1)
Server/Client Authentication and Certificate
168(1)
TLS Tunneling
168(1)
WAP Identity Module
169(1)
Further Information
170(5)
References
171(4)
About the Authors 175(2)
Index 177

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program