CHF119.00
Download est disponible immédiatement
Receive comprehensive instruction on the fundamentals of wireless security from three leading international voices in the field
Security in Wireless Communication Networksdelivers a thorough grounding in wireless communication security. The distinguished authors pay particular attention to wireless specific issues, like authentication protocols for various wireless communication networks,encryption algorithms and integrity schemes on radio channels, lessons learned from designing secure wireless systems and standardization for security in wireless systems.
The book addresses how engineers, administrators, and others involved in the design and maintenance of wireless networks can achieve security while retaining the broadcast nature of the system, with all of its inherent harshness and interference. Readers will learn:
A comprehensive introduction to the background of wireless communication network security, including a broad overview of wireless communication networks, security services, the mathematics crucial to the subject, and cryptographic techniques
An exploration of wireless local area network security, including Bluetooth security, Wi-Fi security, and body area network security
An examination of wide area wireless network security, including treatments of 2G, 3G, and 4G
Discussions of future development in wireless security, including 5G, and vehicular ad-hoc network security
Perfect for undergraduate and graduate students in programs related to wireless communication, Security in Wireless Communication Networks will also earn a place in the libraries of professors, researchers, scientists, engineers, industry managers, consultants, and members of government security agencies who seek to improve their understanding of wireless security protocols and practices.
Auteur
Yi Qian, PhD, is a Professor in the Department of Electrical and Computer Engineering at the University of Nebraska-Lincoln, USA. He is a recipient of the Henry Y. Kleinkauf Family Distinguished New Faculty Teaching Award in 2011, the Holling Family Distinguished Teaching Award in 2012, the Holling Family Distinguished Teaching/Advising/Mentoring Award in 2018, and the Holling Family Distinguished Teaching Award for Innovative Use of Instructional Technology in 2018, all from University of Nebraska-Lincoln, USA.
Feng Ye, PhD, is an Assistant Professor in the Department of Electrical and Computer Engineering at the University of Dayton, USA. He received his PhD from the University of Nebraska-Lincoln, USA, in 2015. He is the author or co-author over 60 technical papers. Hsiao-Hwa Chen, PhD, is Distinguished Professor in the Department of Engineering Science at the National Cheng Kung University in Taiwan. He received his PhD from the University of Oulu, Finland, in 1991. He is the author or co-author of over 400 technical papers.
Contenu
Preface xvii
Acknowledgments xxiii
About the Companion Website xxv
Part I Introduction and Mathematics Background 1
1 Introduction 3
1.1 General Computer Communication Network Architecture 3
1.1.1 Wired Communication Network Infrastructure 3
1.1.2 Wireless Communication Network Infrastructure 4
1.2 Different Types of Wireless Communication Systems 5
1.2.1 Classification of Wireless Communication Systems 5
1.2.1.1 Based on Coverage 5
1.2.1.2 Based on Topology 6
1.2.1.3 Based on Mobility 6
1.2.2 Wireless Personal Area Networks 7
1.2.3 Wireless Local Area Networks 7
1.2.4 Wireless Wide Area Networks 7
1.3 Network Security and Wireless Security 9
1.3.1 Network Security 9
1.3.2 Security Threats in Wireless Networks 10
1.4 Summary 11
2 Basic Network Security Concepts 13
2.1 Security Attacks 13
2.1.1 Passive Attacks 13
2.1.1.1 Eavesdropping 13
2.1.1.2 Traffic Analysis 14
2.1.2 Active Attacks 15
2.2 Security Services 16
2.2.1 Access Control 17
2.2.2 Authentication 17
2.2.3 Confidentiality 18
2.2.4 Integrity 18
2.2.5 Non-repudiation 19
2.2.6 Availability 19
2.3 Security Mechanisms 21
2.3.1 Encipherment 21
2.3.2 Authentication 21
2.3.3 Access Control 22
2.3.4 Digital Signature 22
2.3.5 Data Integrity 23
2.3.6 Traffic Padding and Routing Control 23
2.3.7 Notarization 24
2.4 Other Security Concepts 24
2.4.1 Levels of Impact 24
2.4.2 Cryptographic Protocols 25
2.5 Summary 25
3 Mathematical Background 27
3.1 Basic Concepts in Modern Algebra and Number Theory 27
3.1.1 Group 27
3.1.1.1 Abelian Group 28
3.1.1.2 Cyclic Group 28
3.1.2 Ring 29
3.1.3 Field 29
3.2 Prime Numbers, Modular Arithmetic, and Divisors 30
3.2.1 Prime Numbers 30
3.2.2 Modular Arithmetic 30
3.2.3 Divisors and GCD 31
3.2.4 Multiplicative Inverse 33
3.3 Finite Field and Galois Field 34
3.4 Polynomial Arithmetic 35
3.4.1 Ordinary Polynomial Arithmetic 35
3.4.2 Polynomial Arithmetic in Finite Fields 36
3.4.3 Modular Polynomial Arithmetic 37
3.4.4 Computational Considerations 39
3.4.5 Generating a Finite Field with a Generator 40
3.5 Fermat's Little Theorem, Euler's Totient Function, and Euler's Theorem 41
3.5.1 Fermat's Little Theorem 41
3.5.2 Euler Totient Function 𝜙(n) 42
3.5.3 Euler's Theorem 43
3.6 Primality Testing 44
3.7 Chinese Remainder Theorem 46
3.8 Discrete Logarithm 48
3.9 Summary 49
Part II Cryptographic Systems 51
4 Cryptographic Techniques 53
4.1 Symmetric Encryption 53
4.2 Classical Cryptographic Schemes 53
4.2.1 Classical Substitution Ciphers 54
4.2.1.1 Caesar Cipher 54
4.2.1.2 Monoalphabetic Cipher 55
4.2.1.3 Playfair Cipher 57
4.2.1.4 Polyalphabetic Cipher 58
4.2.1.5 Autokey Cipher 59
4.2.1.6 One-Time Pad 60
4.2.2 Classical Transposition Ciphers 60
4.2.2.1 Rail Fence Cipher 60
4.2.2.2 Row Transposition Cipher 60
4.2.2.3 Product Cipher 61
4.2.3 More Advanced Classical Ciphers 61
4.2.3.1 Rotor Machines 61
4.2.3.2 Steganography 61
4.3 Stream Cipher 62
4.3.1 Rivest Cipher 4 62
4.4 Modern Block Ciphers 63 4.4.1 Overview of Modern Bl...