Wireless network security: theories and applications
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Beijing
Higher Education Press
2013
Heidelberg [u.a.] Springer |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Beschreibung: | X, 274 S. Ill., graph. Darst. |
ISBN: | 9783642365102 9787040366808 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041392644 | ||
003 | DE-604 | ||
005 | 20140428 | ||
007 | t | ||
008 | 131031s2013 ad|| |||| 00||| eng d | ||
020 | |a 9783642365102 |c hbk |9 978-3-642-36510-2 | ||
020 | |a 9787040366808 |c hbk |9 978-7-04-036680-8 | ||
035 | |a (OCoLC)862127634 | ||
035 | |a (DE-599)BVBBV041392644 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-11 |a DE-739 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Chen, Lei |d 1972- |e Verfasser |0 (DE-588)140213279 |4 aut | |
245 | 1 | 0 | |a Wireless network security |b theories and applications |c Lei Chen ... [eds.] |
264 | 1 | |a Beijing |b Higher Education Press |c 2013 | |
264 | 1 | |a Heidelberg [u.a.] |b Springer | |
300 | |a X, 274 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Funknetz |0 (DE-588)4216130-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Funknetz |0 (DE-588)4216130-7 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 4 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-36511-9 |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026840387&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026840387&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
999 | |a oai:aleph.bib-bvb.de:BVB01-026840387 |
Datensatz im Suchindex
_version_ | 1804151493590253568 |
---|---|
adam_text | Contents
Chapter
1 Applications, Technologies, and Standards in
Secure Wireless
Networks and
Communications............................ 1
Lei
Chen
1.1
Introduction
.................................... 1
1.2
Overview of Security in Cellular Networks and
Communications
................................. 3
1.3
Overview of Security in WLANs
...................... 3
1.4
Overview of Security in WMANs
..................... 4
1.5
Overview of Security in Bluetooth Networks and
Communications
................................. 5
1.6
Overview of Security in VANETs
..................... 5
1.7
Overview of Security in WSNs
....................... 6
1.8
Overview of Security in WMNs
....................... 6
1.9
Overview of Security in RFID Networks and
Communications
................................. 7
1.10
Summary
...................................... 7
References
.......................................... 8
Chapter
2
Security in Cellular Networks and
Communications
............................ 9
Chuan-Kun Wu
2.1
Introduction
.................................... 10
2.2
Security architecture of cellular communication networks
· · · · 12
2.3
Security techniques in GSM networks
.................. 14
2.4
Security techniques in 3G networks
.................... 22
2.5
Security techniques in LTE networks
................... 25
2.6
Security issues in femtocell
.......................... 33
2.7
Privacy issues in cellular networks
..................... 34
2.8
Security issues of mobile devices
...................... 35
2.9
Concluding remarks
............................... 35
viii Contents
References
.......................................... 36
Chapter
3
Security in Wireless Local Area Networks
...... 39
Chao
Yang and Guofei Gu
3.1
Introduction to WLAN
............................. 39
3.2
Current State of WLAN Security
..................... 42
3.3
WLAN Communication Security
...................... 46
3.4
WLAN Access Point Security
........................ 53
3.5
Other WLAN Security Issues
........................ 55
3.6
Conclusion
...................................... 56
References
.......................................... 56
Chapter
4
Security in Wireless Metropolitan Area
Networks
.................................. 59
Lei Chen, Narasimha Shashidhar, Shengli Yuan, and Ming Yang
4.1
Introduction
.................................... 60
4.2
Fundamentals of WiMAX
........................... 61
4.3
WiMAX security goals and solutions
................... 63
4.4
WiMAX security vulnerabilities, threats, and
countermeasures
.........*........................ 72
4.5
Summary
....................................... 73
References
.......................................... 74
Chapter
5
Security in Bluetooth Networks and
Communications
............................ 77
Lei Chen, Peter Cooper, and Qingzhong Liu
5.1
Introduction
.................................... 77
5.2
Bluetooth Primer
................................. 78
5.3
Bluetooth Security Solutions
......................... 82
5.4
Bluetooth Security Vulnerabilities, Threats, and
Countermeasures
................................. 90
5.5
Conclusion
...................................... 92
References
.......................................... 93
Chapter
6
Security in Vehicular Ad Hoc Networks
(VANETs)
................................. 95
Weidong Yang
6.1
Introduction
.................................... 95
Contents ix
6.2
Security Architecture Framework for Vehicular Ad Hoc
Networks
....................................... 101
6.3
Secure Communication protocols for Vehicular Ad Hoc
Network
........................................ 115
6.4
Privacy Enhancing and Secure Positioning
............... 120
6.5
Conclusion
...................................... 126
References
.......................................... 127
Chapter
7
Security in Wireless Sensor Networks
.......... 129
Weiping Wang, Shigeng Zhang, Guihua Duan, and Hong Song
7.1
Introduction
.................................... 129
7.2
Key management in WSNs
.......................... 131
7.3
Secure routing protocols in WSNs
..................... 144
7.4
Location privacy protections in WSNs
.................. 153
7.5
Secure data aggregation
............................ 161
7.6
Conclusion
...................................... 172
References
.......................................... 172
Chapter
8
Security in Wireless Sensor Networks
.......... 179
Ping Li, Limin Sun, Xiangyan
Fu,
and
Lin Ning
8.1
Introduction
.................................... 179
8.2
Overview of security architecture for WSN
.............. 181
8.3
Cryptographic Approaches
.......................... 189
8.4
Resilience on Key Management
....................... 195
8.5
Trust Management
................................ 200
8.6
Location Privacy
................................. 214
8.7
Conclusion
...................................... 220
References-
· · ·...................................... 221
Chapter
9
Security in Wireless Mesh Networks
........... 229
Chung-wei Lee
9.1
Introduction
.................................... 229
9.2
Wireless Mesh Networks (WMN) Characteristics
.......... 231
9.3
WMN Security Vulnerabilities
........................ 234
9.4
WMN Defense Mechanisms
.......................... 236
9.5
WMN Security Standards and Products
................ 243
9.6
Conclusion
...................................... 244
References
.......................................... 244
χ
Contents
Chapter
10
Security in RFID Networks and
Communications
........................... 247
Chiu
С.
Tan and Jie Wu
10.1
Introduction
.................................... 247
10.2
RFID Network Primer
............................ 248
10.3
Security Requirements
............................ 252
10.4
Hardware Based Solutions
.......................... 253
10.5
Basic Protocol Based Solutions
...................... 254
10.6
Advance Protocol Based Solutions
.................... 258
10.7
Commercial RFID Security
......................... 260
10.8
Conclusion·
· · · ·................................ 264
References
.......................................... 265
Index
............................................... 269
Wireless Network Security Vieories and Applications discusses the relevant
security technologies, vulnerabilities, and potential threats, and introduces
the corresponding security standards and protocols, as well as provides
solutions to security concerns. Authors of each chapter in this book, mostly
top researchers in relevant research fields in the U.S. and China, presented
their research findings and results about the security of the following types
of wireless networks: Wireless Cellular Networks, Wireless Local Area
Networks (WLANs), Wireless Metropolitan Area Networks (WMANs),
Bluetooth Networks and Communications, Vehicular Ad Hoc Networks
(VANETs), Wireless Sensor Networks (WSNs), Wireless Mesh Networks
(WMNs), and Radio Frequency Identification (RFID).
The audience of this book may include professors, researchers, graduate
students, and professionals in the areas of Wireless Networks, Network
Security and Information Security, Information Privacy and Assurance, as
well as Digital Forensics.
|
any_adam_object | 1 |
author | Chen, Lei 1972- |
author_GND | (DE-588)140213279 |
author_facet | Chen, Lei 1972- |
author_role | aut |
author_sort | Chen, Lei 1972- |
author_variant | l c lc |
building | Verbundindex |
bvnumber | BV041392644 |
classification_rvk | ST 200 ST 277 |
ctrlnum | (OCoLC)862127634 (DE-599)BVBBV041392644 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02243nam a2200493 c 4500</leader><controlfield tag="001">BV041392644</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140428 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">131031s2013 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642365102</subfield><subfield code="c">hbk</subfield><subfield code="9">978-3-642-36510-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9787040366808</subfield><subfield code="c">hbk</subfield><subfield code="9">978-7-04-036680-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)862127634</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041392644</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chen, Lei</subfield><subfield code="d">1972-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)140213279</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Wireless network security</subfield><subfield code="b">theories and applications</subfield><subfield code="c">Lei Chen ... [eds.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beijing</subfield><subfield code="b">Higher Education Press</subfield><subfield code="c">2013</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Heidelberg [u.a.]</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 274 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-36511-9</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026840387&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026840387&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026840387</subfield></datafield></record></collection> |
id | DE-604.BV041392644 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:55:42Z |
institution | BVB |
isbn | 9783642365102 9787040366808 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026840387 |
oclc_num | 862127634 |
open_access_boolean | |
owner | DE-11 DE-739 |
owner_facet | DE-11 DE-739 |
physical | X, 274 S. Ill., graph. Darst. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Higher Education Press Springer |
record_format | marc |
spelling | Chen, Lei 1972- Verfasser (DE-588)140213279 aut Wireless network security theories and applications Lei Chen ... [eds.] Beijing Higher Education Press 2013 Heidelberg [u.a.] Springer X, 274 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Funknetz (DE-588)4216130-7 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Funknetz (DE-588)4216130-7 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Privatsphäre (DE-588)4123980-5 s Kryptologie (DE-588)4033329-2 s DE-604 Erscheint auch als Online-Ausgabe 978-3-642-36511-9 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026840387&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026840387&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext |
spellingShingle | Chen, Lei 1972- Wireless network security theories and applications Funknetz (DE-588)4216130-7 gnd Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd Privatsphäre (DE-588)4123980-5 gnd |
subject_GND | (DE-588)4216130-7 (DE-588)4011144-1 (DE-588)4033329-2 (DE-588)4274324-2 (DE-588)4123980-5 |
title | Wireless network security theories and applications |
title_auth | Wireless network security theories and applications |
title_exact_search | Wireless network security theories and applications |
title_full | Wireless network security theories and applications Lei Chen ... [eds.] |
title_fullStr | Wireless network security theories and applications Lei Chen ... [eds.] |
title_full_unstemmed | Wireless network security theories and applications Lei Chen ... [eds.] |
title_short | Wireless network security |
title_sort | wireless network security theories and applications |
title_sub | theories and applications |
topic | Funknetz (DE-588)4216130-7 gnd Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd Privatsphäre (DE-588)4123980-5 gnd |
topic_facet | Funknetz Datensicherung Kryptologie Computersicherheit Privatsphäre |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026840387&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026840387&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT chenlei wirelessnetworksecuritytheoriesandapplications |