Cover image for Security in Wireless Networks and Mobile Platforms.
Security in Wireless Networks and Mobile Platforms.
Title:
Security in Wireless Networks and Mobile Platforms.
Author:
Aissi, Selim.
ISBN:
9781596930094
Personal Author:
Physical Description:
1 online resource (332 pages)
Series:
Artech House Universal Personal Communications
Contents:
Security for Mobile Networks and Platforms -- Contents v -- Preface xv -- 1 Introduction 1 -- 1.1 Overview 1 -- 1.2 Trusted Mobile Platforms 6 -- 1.3 Overview of the Book 11 -- References 12 -- 2 Authentication, Authorization, and Non-Repudiation 13 -- 2.1 Introduction 13 -- 2.2 Authentication 13 -- 2.3 Authorization 17 -- 2.4 Non-Repudiation 19 -- References 21 -- 3 Cryptographic Techniques 23 -- 3.1 GSM Algorithms 24 -- 3.3 Bluetooth 34 -- 3.4 The 802.11 Standard 38 -- References 43 -- 4 Hardware Security 45 -- 4.1 Introduction 45 -- 4.2 Threats Addressed by Hardware Protection 46 -- 4.3 Hardware Security Solutions 48 -- References 66 -- 5 Software Security 67 -- 5.1 Introduction 67 -- 5.2 The New Risks 68 -- 5.3 Elements of Mobile Security 68 -- 5.4 Communications Software Security 69 -- 5.5 Mobile OS Security 71 -- 5.6 Web Services Security 75 -- 5.7 Content Protection 79 -- 5.8 Managed Runtime Security 83 -- 5.9 Access Control 89 -- References 90 -- 6 Security Certification and Evaluation 93 -- 6.1 Introduction 93 -- 6.2 Security Certification Schemes 95 -- 6.3 Privacy Aspects 100 -- References 102 -- 7 Higher Layer Security 105 -- 7.1 SSL and TLS Protocols 106 -- 7.2 Other Higher Layer Protocols 112 -- 7.3 Known Issues and Possible Solutions 113 -- 7.4 Security in WAP 114 -- References 116 -- 8 IP Layer Security 117 -- 8.1 AH and ESP 119 -- 8.2 Key Management 122 -- 8.3 IP Address Configuration 124 -- 8.4 Network Address Translation 124 -- 8.5 VPN 126 -- 8.6 Mobile IP and IPsec 129 -- References 134 -- 9 AAA 135 -- 9.1 AAA Basics 135 -- 9.2 AAA Protocols 138 -- 9.3 MIP and AAA 142 -- 9.4 Wireless Internet Service Provider Roaming 143 -- 9.5 AAA in Mobile Systems 145 -- References 148 -- 10 IEEE 802.1X and EAP 149 -- 10.1 IEEE 802.1X 150 -- 10.2 EAP 152 -- References 162 -- 11 WPAN Security 163 -- 11.1 Introduction 163 -- 11.2 Bluetooth 163.

11.3 Other Emerging WPAN Technologies 173 -- References 176 -- 12 WLANs Security 177 -- 12.1 Security in IEEE 802.11 178 -- 12.2 IEEE 802.11 Security Issues 180 -- 12.3 Countermeasures 185 -- 12.4 WPA and IEEE 802.11i RSN 186 -- 12.5 Secure WLAN Deployment 195 -- 12.6 802.11i Future 214 -- References 214 -- 13 WMAN 217 -- 13.1 An Introduction to 802.16 217 -- 13.2 IEEE 802.16-2004 Security 223 -- 13.3 PKM Security Issues 226 -- 13.4 PKMv2 227 -- References 230 -- 14 WWAN Security 231 -- 14.1 GSM Security 231 -- 14.2 3GPP Security 237 -- References 242 -- 15 Future Security Challenges 245 -- 15.1 Introduction 245 -- 15.2 The Need for Future Generation Communications 247 -- 15.3 Defining the Future 251 -- 15.4 Technologies 256 -- 15.5 Other Technologies 261 -- 15.6 Future Development: Protocol Layers and Technologies 262 -- 15.7 Wireless Standards Activities Toward the Future 265 -- 15.7 Wireless Standards Activities Toward the Future 265 -- 15.8 Standardization and Regulations 268 -- 15.9 Mobile Networks Security Issues 269 -- 15.10 Mobile Platforms Security Issues 273 -- 15.11 Conclusions 275 -- References 276 -- 16 Mobile Security Threat Catalog 277 -- 16.1 Software Threats 277 -- 16.2 Hardware Threats 280 -- 16.3 Network Threats 280 -- 16.4 Protections Means 285 -- References 286 -- List of Acronyms 287 -- About the Authors 301 -- Index 303.
Abstract:
With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers, architects, and engineers into mobile security specialists. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology's security weaknesses and provides comprehensive countermeasures to thwart threats. It explains in language geared for networking professionals the essentials of the latest security standards and protocols. Most importantly, the book pinpoints security issues encountered end-to-end throughout an entire mobile network. The book's complete catalog of security vulnerabilities ensures that all viable security measures are taken. A practical, hands-on discussion of promising next-generation research into mobile security prepares mobile professionals for the ever-looming next waves of security threats.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: