Cover image for Bulletproof Wireless Security : GSM, UMTS, 802.11, and Ad Hoc Security.
Bulletproof Wireless Security : GSM, UMTS, 802.11, and Ad Hoc Security.
Title:
Bulletproof Wireless Security : GSM, UMTS, 802.11, and Ad Hoc Security.
Author:
Chandra, Praphul.
ISBN:
9780080476315
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (272 pages)
Series:
Communications Engineering
Contents:
Cover -- Contents -- Preface -- ... but where does the voice go?Ž -- A Brief History of Wireless -- A Brief History of Security -- Moving On -- Reading Conventions -- How to Read this Book? -- Acknowledgments -- Acronyms -- About the Author -- Chapter 1 Security and Cryptography -- 1.1 What is Security? -- 1.2 Cryptography -- 1.2.1 Confidentiality -- 1.2.2 Integrity -- 1.2.3 Authentication -- 1.2.4 Replay Protection and Nonrepudiation -- 1.3 Cryptanalysis -- 1.4 Block Ciphers -- 1.4.1 Using the Ciphers: The Modes -- 1.5 Stream Ciphers -- 1.6 How Secure is Cryptography? -- 1.6.1 Strength of a Cipher -- 1.6.2 Key-Length: How Long is Secure? -- 1.7 Beyond Cryptography -- 1.7.1 Firewalls -- 1.7.2 Denial of Service Attacks -- 1.7.3 Code Security -- 1.7.4 Steganography -- 1.8 Conclusion -- Chapter 2: Network Security Protocols -- 2.1 Introduction -- 2.2 Key Establishment Protocols -- 2.2.1 Key Generation in SKC -- 2.2.2 Key Distribution in SKC -- 2.2.3 Key Establishment in PKC -- 2.2.4 Diffie-Hellman Key Exchange -- 2.2.5 Enhanced Diffie-Hellman Key Exchange -- 2.2.6 RSA -- 2.3 Authentication Protocols -- 2.3.1 Address-Based Authentication -- 2.3.2 Passwords for Local Authentication (Login) -- 2.3.3 Passwords for Network Authentication -- 2.3.4 Authentication Using SKC -- 2.3.5 Authentication Using PKC -- 2.3.6 What to Use for Authentication: SKC or PKC? -- 2.3.7 Session Hijacking -- 2.3.8 Needham Schroeder -- 2.3.9 Kerberos -- 2.4 Encryption Protocols -- 2.4.1 DES -- 2.4.2 TripleDES or 3DES -- 2.4.3 AES -- 2.4.4 RC4 -- 2.5 Integrity Protocols -- 2.5.1 CBC Residue -- 2.5.2 CRC32 -- 2.5.3 MD5 -- Chapter 3: Security and the Layered Architecture -- 3.1 Introduction -- 3.2 Security at Layer 1 -- 3.3 Security at Layer 2 -- 3.3.1 Extensible Authentication Protocol (EAP) -- 3.3.2 EAPoL: EAP Over LAN -- 3.3.3 EAP-TLS: TLS Handshake Over EAP.

3.4 Security at Layer 3 -- 3.5 Security at Layer 4: SSL/TLS -- 3.6 Security at Layer 5+ -- Chapter 4: Voice-Oriented Wireless Networks -- 4.1 The Wireless Medium -- 4.1.1 Radio Propagation Effects -- 4.1.2 Hidden Terminal Problem -- 4.1.3 Exposed Terminal Problem -- 4.1.4 Bandwidth -- 4.1.5 Other Constraints -- 4.2 The Cellular Architecture -- 4.3 TWNs: First Generation -- 4.3.1 Addresses in AMPS -- 4.3.2 Call Setup in AMPS -- 4.4 TWNs: Second Generation -- 4.4.1 Addresses in GSM -- 4.4.2 Call Setup in GSM -- 4.5 TWNs: Third Generation -- 4.5.1 Connection Setup in UMTS -- 4.6 The Overall Picture -- Chapter 5: Data-Oriented Wireless Networks -- 5.1 WLANs -- 5.1.1: Addresses in 802.11 -- 5.1.2 Connection Setup in 802.11 -- 5.1.3 Media Access -- 5.1.4 Spectrum Efficiency in 802.11 -- 5.2 MANETs -- 5.2.1 MAC for MANETs -- 5.2.2 Routing in MANETs. -- 5.2.3 Address Allocation in MANETs -- 5.2.4 Security in MANETs -- 5.3 Wireless Networks in the Near Future -- Chapter 6: Security in Traditional Wireless Networks -- 6.1 Security in First Generation TWNs -- 6.2 Security in Second Generation TWNs -- 6.2.1 Anonymity in GSM -- 6.2.2 Key Establishment in GSM -- 6.2.3 Authentication in GSM -- 6.2.4 Confidentiality in GSM -- 6.2.5 What's Wrong with GSM Security? -- 6.3 Security in 2.5 Generation TWNs -- 6.3.1 WAP -- 6.3.2 Code Security -- 6.4 Security in 3G TWNs -- 6.4.1 Anonymity in UMTS -- 6.4.2 Key Establishment in UMTS -- 6.4.3 Authentication in UMTS -- 6.4.4 Confidentiality in UMTS -- 6.4.5 Integrity Protection in UMTS -- 6.4.6 Putting the Pieces Together -- 6.4.7 Network Domain Security -- 6.5 Summary -- Chapter 7: Security in Wireless Local Area Networks -- 7.1 Introduction -- 7.2 Key Establishment in 802.11 -- 7.2.1 What's Wrong? -- 7.3 Anonymity in 802.11 -- 7.4 Authentication in 802.11 -- 7.4.1 Open System Authentication -- 7.4.2 Shared Key Authentication.

7.4.3 Authentication and Handoffs -- 7.4.4 What's Wrong with 802.11 Authentication? -- 7.4.5 Pseudo-Authentication Schemes -- 7.5 Confidentiality in 802.11 -- 7.5.1 What's Wrong with WEP? -- 7.6 Data Integrity in 802.11 -- 7.7 Loopholes in 802.11 Security -- 7.8 WPA -- 7.8.1 Key Establishment -- 7.8.2 Authentication -- 7.8.3 Confidentiality -- 7.8.4 Integrity -- 7.8.5 The Overall Picture: Confidentiality + Integrity -- 7.8.6 How Does WPA Fix WEP Loopholes? -- 7.9 WPA2 (802.11i) -- 7.9.1 Key Establishment -- 7.9.2 Authentication -- 7.9.3 Confidentiality -- 7.9.4 Integrity -- 7.9.5 The Overall Picture: Confidentiality + Integrity -- Chapter 8: Security in Wireless Ad Hoc Networks -- 8.1 Introduction -- 8.2 Routing in Multihop Ad Hoc Networks -- 8.2.1 Proactive Routing -- 8.2.2 Reactive Routing -- 8.2.3 Hybrid Routing -- 8.2.4. Routing Attacks -- 8.2.5 Secure Routing -- 8.3 Key Establishment and Authentication -- 8.3.1 Threshold Secret Sharing -- 8.4 Confidentiality and Integrity -- 8.5 Bluetooth -- 8.5.1 Bluetooth Basics -- 8.5.2 Security Modes -- 8.5.3 Key Establishment -- 8.5.4 Authentication -- 8.5.5 Confidentiality -- 8.5.6 Integrity Protection -- 8.5.7 Enhancements -- References -- Index.
Abstract:
Finally--a single volume guide to really effective security for both voice and data wireless networks! More and more data and voice communications are going via wireless at some point between the sender and intended recipient. As a result, truly "bulletproof" wireless security is now more than a desirable feature--instead, it's a necessity to protect essential personal and business data from hackers and eavesdroppers. In this handy reference, Praphul Chandra gives you the conceptual and practical tools every RF, wireless, and network engineer needs for high-security wireless applications. Book Review From EDN Magazine: http://www.edn.com/article/CA632302.html?industryid=2817 Inside this book you'll find coverage of these essential topics: + Cryptographic protocols used in wireless networks. + Key-based protocols, including key exchange and authentication techniques + Various types of wireless network attacks, including reflection, session hijacks, and Fluhrer-Mantin-Shamir (FMS) attacks. + Encryption/decryption standards and methods. + Multi-layered security architectures. + Secure sockets layer (SSL) and transport layer security (TLS) protocols. + Cellular telephone network architectures and their vulnerabilities. + Modulation techniques, such as direct-sequence spread spectrum (DSSS) and orthogonal frequency division multiplexing (OFDM). And you'll also find coverage on such cutting-edge topics as security techniques for ad hoc networks and protecting Bluetooth networks. If you're serious about wireless security, then this title belongs on your reference bookshelf!.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: