Wireless Internet security: architecture and protocols
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cambridge [u.a.]
Cambridge Univ. Press
2008
|
Ausgabe: | 1. publ. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | IX, 212 S. Ill., graph. Darst., Kt. |
ISBN: | 9780521887830 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV035067910 | ||
003 | DE-604 | ||
005 | 20081219 | ||
007 | t | ||
008 | 080924s2008 xxuabd| |||| 00||| eng d | ||
010 | |a 2008023549 | ||
020 | |a 9780521887830 |c hbk |9 978-0-521-88783-0 | ||
035 | |a (OCoLC)229446388 | ||
035 | |a (DE-599)BVBBV035067910 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-473 |a DE-20 |a DE-29T | ||
050 | 0 | |a TK5103.4885 | |
082 | 0 | |a 005.8 | |
084 | |a ST 205 |0 (DE-625)143613: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Kempf, James |e Verfasser |4 aut | |
245 | 1 | 0 | |a Wireless Internet security |b architecture and protocols |c James Kempf |
250 | |a 1. publ. | ||
264 | 1 | |a Cambridge [u.a.] |b Cambridge Univ. Press |c 2008 | |
300 | |a IX, 212 S. |b Ill., graph. Darst., Kt. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Wireless Internet |x Security measures | |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Funknetz |0 (DE-588)4216130-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Funknetz |0 (DE-588)4216130-7 |D s |
689 | 0 | 1 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016736324&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016736324 |
Datensatz im Suchindex
_version_ | 1804138014940594176 |
---|---|
adam_text | Contents
Preface
page vii
Acknowledgements
χ
Security basics
1
1.1
Importance of a threat analysis
2
1.2
Classes of threats
5
1.3
Classes of security services
8
1.4
Supporting security systems
10
1.5
Summary
19
Network system architecture basics
21
2.1
The role of architecture in network system standardization
21
2.2
The functional architecture approach
23
2.3
Example functional architecture for a simple wireless system
26
2.4
Functional architecture for network security systems
28
2.5
Example functional architecture for a wireless security system
30
2.6
Summary
34
Cryptographic algorithms and security primitives
35
3.1
Replay protection algorithms
36
3.2
Message digests and cryptographic hash functions
37
3.3
Shared key encryption
42
3.4
Public key algorithms
48
3.5
Key provisioning
51
3.6
Summary
55
Wireless IP network access control
57
4.1
Wireless network usage models
58
4.2
Threats to wireless network access
59
4.3
Functional architecture for network access control
60
4.4
Subscription-based design
72
Contents
4.5 Hotspot
design
85
4.6
Summary
91
Local IP subnet configuration and address resolution security
93
5.1
Impact of the IP routing and addressing architecture on mobility
93
5.2
Review of local IP subnet configuration and address resolution protocols
96
5.3
Threats to local IP subnet configuration and address resolution
103
5.4
Functional architecture for local IP subnet configuration and address
resolution security
106
5.5
Security protocols for address resolution, address
autoconfiguration,
and
router discovery
113
5.6
Security protocols for Local Subnet Configuration Server access
125
5.7
Summary
128
Security for global IP mobility
130
6.1
Review of IP mobility architecture and protocols
131
6.2
Threats to Mobile IP security
135
6.3
Functional architecture for Mobile IP security
138
6.4
The IP Security
(IPsec)
protocol
147
6.5
Return routability
162
6.6
The limits of security architectures: the example of Mobile IP
166
6.7
Summary
167
Location privacy
169
7.1
Threats against privacy and location privacy
170
7.2
Security protocols for privacy in IP communication
172
7.3
Security protocols for location privacy in the wireless Internet
176
7.4
An architectural approach to location privacy
181
7.5
Summary
197
References
199
Index
202
|
adam_txt |
Contents
Preface
page vii
Acknowledgements
χ
Security basics
1
1.1
Importance of a threat analysis
2
1.2
Classes of threats
5
1.3
Classes of security services
8
1.4
Supporting security systems
10
1.5
Summary
19
Network system architecture basics
21
2.1
The role of architecture in network system standardization
21
2.2
The functional architecture approach
23
2.3
Example functional architecture for a simple wireless system
26
2.4
Functional architecture for network security systems
28
2.5
Example functional architecture for a wireless security system
30
2.6
Summary
34
Cryptographic algorithms and security primitives
35
3.1
Replay protection algorithms
36
3.2
Message digests and cryptographic hash functions
37
3.3
Shared key encryption
42
3.4
Public key algorithms
48
3.5
Key provisioning
51
3.6
Summary
55
Wireless IP network access control
57
4.1
Wireless network usage models
58
4.2
Threats to wireless network access
59
4.3
Functional architecture for network access control
60
4.4
Subscription-based design
72
Contents
4.5 Hotspot
design
85
4.6
Summary
91
Local IP subnet configuration and address resolution security
93
5.1
Impact of the IP routing and addressing architecture on mobility
93
5.2
Review of local IP subnet configuration and address resolution protocols
96
5.3
Threats to local IP subnet configuration and address resolution
103
5.4
Functional architecture for local IP subnet configuration and address
resolution security
106
5.5
Security protocols for address resolution, address
autoconfiguration,
and
router discovery
113
5.6
Security protocols for Local Subnet Configuration Server access
125
5.7
Summary
128
Security for global IP mobility
130
6.1
Review of IP mobility architecture and protocols
131
6.2
Threats to Mobile IP security
135
6.3
Functional architecture for Mobile IP security
138
6.4
The IP Security
(IPsec)
protocol
147
6.5
Return routability
162
6.6
The limits of security architectures: the example of Mobile IP
166
6.7
Summary
167
Location privacy
169
7.1
Threats against privacy and location privacy
170
7.2
Security protocols for privacy in IP communication
172
7.3
Security protocols for location privacy in the wireless Internet
176
7.4
An architectural approach to location privacy
181
7.5
Summary
197
References
199
Index
202 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Kempf, James |
author_facet | Kempf, James |
author_role | aut |
author_sort | Kempf, James |
author_variant | j k jk |
building | Verbundindex |
bvnumber | BV035067910 |
callnumber-first | T - Technology |
callnumber-label | TK5103 |
callnumber-raw | TK5103.4885 |
callnumber-search | TK5103.4885 |
callnumber-sort | TK 45103.4885 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 205 ST 277 |
ctrlnum | (OCoLC)229446388 (DE-599)BVBBV035067910 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 1. publ. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01654nam a2200445zc 4500</leader><controlfield tag="001">BV035067910</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20081219 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080924s2008 xxuabd| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2008023549</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780521887830</subfield><subfield code="c">hbk</subfield><subfield code="9">978-0-521-88783-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)229446388</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035067910</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-29T</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5103.4885</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 205</subfield><subfield code="0">(DE-625)143613:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kempf, James</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Wireless Internet security</subfield><subfield code="b">architecture and protocols</subfield><subfield code="c">James Kempf</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. publ.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge [u.a.]</subfield><subfield code="b">Cambridge Univ. Press</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">IX, 212 S.</subfield><subfield code="b">Ill., graph. Darst., Kt.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016736324&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016736324</subfield></datafield></record></collection> |
id | DE-604.BV035067910 |
illustrated | Illustrated |
index_date | 2024-07-02T22:03:04Z |
indexdate | 2024-07-09T21:21:28Z |
institution | BVB |
isbn | 9780521887830 |
language | English |
lccn | 2008023549 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016736324 |
oclc_num | 229446388 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-20 DE-29T |
owner_facet | DE-473 DE-BY-UBG DE-20 DE-29T |
physical | IX, 212 S. Ill., graph. Darst., Kt. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Cambridge Univ. Press |
record_format | marc |
spelling | Kempf, James Verfasser aut Wireless Internet security architecture and protocols James Kempf 1. publ. Cambridge [u.a.] Cambridge Univ. Press 2008 IX, 212 S. Ill., graph. Darst., Kt. txt rdacontent n rdamedia nc rdacarrier Wireless Internet Security measures Internet (DE-588)4308416-3 gnd rswk-swf Funknetz (DE-588)4216130-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Funknetz (DE-588)4216130-7 s Internet (DE-588)4308416-3 s Computersicherheit (DE-588)4274324-2 s DE-604 Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016736324&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Kempf, James Wireless Internet security architecture and protocols Wireless Internet Security measures Internet (DE-588)4308416-3 gnd Funknetz (DE-588)4216130-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4308416-3 (DE-588)4216130-7 (DE-588)4274324-2 |
title | Wireless Internet security architecture and protocols |
title_auth | Wireless Internet security architecture and protocols |
title_exact_search | Wireless Internet security architecture and protocols |
title_exact_search_txtP | Wireless Internet security architecture and protocols |
title_full | Wireless Internet security architecture and protocols James Kempf |
title_fullStr | Wireless Internet security architecture and protocols James Kempf |
title_full_unstemmed | Wireless Internet security architecture and protocols James Kempf |
title_short | Wireless Internet security |
title_sort | wireless internet security architecture and protocols |
title_sub | architecture and protocols |
topic | Wireless Internet Security measures Internet (DE-588)4308416-3 gnd Funknetz (DE-588)4216130-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Wireless Internet Security measures Internet Funknetz Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016736324&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kempfjames wirelessinternetsecurityarchitectureandprotocols |