Wireless Communications Security
This cutting-edge resource offers a broad overview of wireless security, as well as a solid understanding of critical cryptography techniques and the methods used to implement an effective cryptography architecture for any organization.
1100909367
Wireless Communications Security
This cutting-edge resource offers a broad overview of wireless security, as well as a solid understanding of critical cryptography techniques and the methods used to implement an effective cryptography architecture for any organization.
115.0 In Stock
Wireless Communications Security

Wireless Communications Security

Wireless Communications Security

Wireless Communications Security

Hardcover(New Edition)

$115.00 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

This cutting-edge resource offers a broad overview of wireless security, as well as a solid understanding of critical cryptography techniques and the methods used to implement an effective cryptography architecture for any organization.

Product Details

ISBN-13: 9781580535205
Publisher: Artech House, Incorporated
Publication date: 11/30/2005
Series: Artech House Universal Personal Communications Library
Edition description: New Edition
Pages: 196
Product dimensions: 6.14(w) x 9.21(h) x 0.50(d)

About the Author

Hideki Imai is a full professor in the Institute of Industrial Science, University of Tokyo. Dr. Imai is the author/coauthor of 35 books and is a renowned speaker at conferences worldwide. He received his B.E., M.E. and Ph.D. in electrical engineering from the University of Tokyo.

Table of Contents

Prefacexi
1Introduction1
2Cryptography5
2.1Introduction5
2.2Basic Concepts5
2.2.1Ciphertext and Plaintext5
2.2.2Types of Cryptosystems6
2.2.3Goals of a Cryptosystem7
2.2.4Security8
2.3Symmetric Encryption Schemes9
2.4Perfect Secrecy: The One-Time Pad9
2.5Block Ciphers11
2.5.1Permutation11
2.5.2Substitution12
2.5.3Diffusion/Confusion13
2.5.4SP Networks14
2.5.5Basic Structure14
2.5.6Modes of Use15
2.5.7DES17
2.5.8AES18
2.6Stream Ciphers19
2.6.1Advantages20
2.6.2Security Remarks20
2.6.3Some Examples21
2.7Asymmetric Cryptosystems and Digital Signatures21
2.7.1Public-Key Encryption22
2.7.2Public Key Infrastructure (PKI) and Certificate Authorities (CA)23
2.7.3Mathematical Background25
2.7.4Diffie-Hellman Key Agreement27
2.7.5RSA Cryptosystem28
2.7.6ElGamal Cryptosystem29
2.7.7Necessary Security for Practical Public Key Encryption Systems31
2.7.8Digital Signature32
2.7.9Mathematical Background33
2.7.10RSA Signature Scheme35
2.7.11Digital Signature Algorithm (DSA)36
2.7.12Necessary Security for Practical Digital Signature Systems36
References38
3Security Features in Wireless Environment41
3.1Introduction41
3.2Mobile Network Environment42
3.3General Security Threats of a Network44
3.4Limitations of Mobile Environment45
3.5Mobility and Security46
3.6Attacks in Mobile Environment46
3.6.1Nuisance Attack47
3.6.2Impersonation Attack48
3.6.3Interception Attack48
3.6.4Replay Attack48
3.6.5Parallel Session Attack48
3.7Security Issues in Mobile Environment49
3.7.1Authentication49
3.7.2Anonymity50
3.7.3Device Vulnerability52
3.7.4Domain Boundary Crossing52
References53
4Standard Protocols55
4.1IEEE 802.1155
4.1.1Brief History55
4.1.2IEEE802.11 Architecture56
4.1.3IEEE 802.11 Layers60
4.1.4Security of IEEE 802.1162
4.1.5Key Management69
4.1.6Weaknesses of WEP70
4.2Bluetooth72
4.2.1Bluetooth Overview72
4.2.2Brief History73
4.2.3Benefits74
4.2.4Bluetooth Architecture and Components76
4.2.5Security of Bluetooth78
4.2.6Problems in the Security of Bluetooth89
Reference90
5Security in 2G Systems91
5.1GSM System92
5.1.1Introduction92
5.1.2Architecture of the GSM Network93
5.1.3GSM Security Features96
5.1.4Attacks on GSM Security103
5.2I-mode Introduction106
5.2.1Introduction106
5.2.2I-mode System Overview107
5.2.3SSL Overview108
5.2.4Protocol Stack110
5.2.5HTTP Tunneling Protocol114
5.2.6Postscript116
5.3CDPD116
5.3.1Introduction116
5.3.2Basic Idea118
5.3.3Basic Infrastructure119
5.3.4How a CDPD Connection Works122
5.3.5CDPD Security125
References129
6Security in 3G and 4G Systems131
6.13G Wireless Communications Systems131
6.2Third Generation Partnership Project (3GPP)133
6.2.13GPP Security Objectives133
6.33G Security Architecture134
6.3.1Network Access Security135
6.3.2Network Domain Security136
6.3.3User Domain Security136
6.3.4Provider-User Link Security136
6.3.5Visibility and Configurability of Security137
6.4Authentication and Key Agreement (AKA) in 3GPP137
6.5Confidentiality and Integrity138
6.5.1Confidentiality139
6.5.2Data Integrity140
6.64G Wireless Communications Systems141
References142
7Wireless Application Protocol (WAP)143
7.1Introduction143
7.2WAP Protocol Stack144
7.3WAP PKI Model147
7.3.1WTLS Class 2148
7.3.2WTLS Class 3 and SignText152
7.4Cipher Suite in WTLS156
7.4.1Key Exchange Suite156
7.4.2Elliptic Curve Parameters in WTLS160
7.4.3Bulk Encryption and MAC Suite161
7.5WAP-Profiled TLS163
7.5.1Cipher Suites164
7.5.2Session ID and Session Resume167
7.5.3Server/Client Authentication and Certificate168
7.5.4TLS Tunneling168
7.6WAP Identity Module169
7.7Further Information170
References171
About the Authors175
Index177
From the B&N Reads Blog

Customer Reviews