Wireless Communications Security / Edition 1

Wireless Communications Security / Edition 1

ISBN-10:
1580535208
ISBN-13:
9781580535205
Pub. Date:
11/30/2005
Publisher:
Artech House, Incorporated
ISBN-10:
1580535208
ISBN-13:
9781580535205
Pub. Date:
11/30/2005
Publisher:
Artech House, Incorporated
Wireless Communications Security / Edition 1

Wireless Communications Security / Edition 1

Hardcover

$115.0
Current price is , Original price is $115.0. You
$115.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.


Overview

Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers a broad overview of wireless security, so engineers can choose the methods and techniques that are most appropriate for their projects. Professionals gain a solid understanding of critical cryptography techniques, such as private/public key encryption, digital signatures, and block and stream ciphers. The book provides expert guidance on how to evaluate cryptography deployment impact on current wireless network architectures and implement an effective cryptography architecture for any organization. This forward-looking resource offers the technical know-how practitioners need to understand and work with the security concepts and techniques used for 2nd, 3rd, and 4th generation mobile networks.

Product Details

ISBN-13: 9781580535205
Publisher: Artech House, Incorporated
Publication date: 11/30/2005
Series: Artech House Universal Personal Communications Library
Edition description: New Edition
Pages: 196
Product dimensions: 6.14(w) x 9.21(h) x 0.50(d)

About the Author

Hideki Imai is a full professor in the Institute of Industrial Science, University of Tokyo. Dr. Imai is the author/coauthor of 35 books and is a renowned speaker at conferences worldwide. He received his B.E., M.E. and Ph.D. in electrical engineering from the University of Tokyo.

Table of Contents

Prefacexi
1Introduction1
2Cryptography5
2.1Introduction5
2.2Basic Concepts5
2.2.1Ciphertext and Plaintext5
2.2.2Types of Cryptosystems6
2.2.3Goals of a Cryptosystem7
2.2.4Security8
2.3Symmetric Encryption Schemes9
2.4Perfect Secrecy: The One-Time Pad9
2.5Block Ciphers11
2.5.1Permutation11
2.5.2Substitution12
2.5.3Diffusion/Confusion13
2.5.4SP Networks14
2.5.5Basic Structure14
2.5.6Modes of Use15
2.5.7DES17
2.5.8AES18
2.6Stream Ciphers19
2.6.1Advantages20
2.6.2Security Remarks20
2.6.3Some Examples21
2.7Asymmetric Cryptosystems and Digital Signatures21
2.7.1Public-Key Encryption22
2.7.2Public Key Infrastructure (PKI) and Certificate Authorities (CA)23
2.7.3Mathematical Background25
2.7.4Diffie-Hellman Key Agreement27
2.7.5RSA Cryptosystem28
2.7.6ElGamal Cryptosystem29
2.7.7Necessary Security for Practical Public Key Encryption Systems31
2.7.8Digital Signature32
2.7.9Mathematical Background33
2.7.10RSA Signature Scheme35
2.7.11Digital Signature Algorithm (DSA)36
2.7.12Necessary Security for Practical Digital Signature Systems36
References38
3Security Features in Wireless Environment41
3.1Introduction41
3.2Mobile Network Environment42
3.3General Security Threats of a Network44
3.4Limitations of Mobile Environment45
3.5Mobility and Security46
3.6Attacks in Mobile Environment46
3.6.1Nuisance Attack47
3.6.2Impersonation Attack48
3.6.3Interception Attack48
3.6.4Replay Attack48
3.6.5Parallel Session Attack48
3.7Security Issues in Mobile Environment49
3.7.1Authentication49
3.7.2Anonymity50
3.7.3Device Vulnerability52
3.7.4Domain Boundary Crossing52
References53
4Standard Protocols55
4.1IEEE 802.1155
4.1.1Brief History55
4.1.2IEEE802.11 Architecture56
4.1.3IEEE 802.11 Layers60
4.1.4Security of IEEE 802.1162
4.1.5Key Management69
4.1.6Weaknesses of WEP70
4.2Bluetooth72
4.2.1Bluetooth Overview72
4.2.2Brief History73
4.2.3Benefits74
4.2.4Bluetooth Architecture and Components76
4.2.5Security of Bluetooth78
4.2.6Problems in the Security of Bluetooth89
Reference90
5Security in 2G Systems91
5.1GSM System92
5.1.1Introduction92
5.1.2Architecture of the GSM Network93
5.1.3GSM Security Features96
5.1.4Attacks on GSM Security103
5.2I-mode Introduction106
5.2.1Introduction106
5.2.2I-mode System Overview107
5.2.3SSL Overview108
5.2.4Protocol Stack110
5.2.5HTTP Tunneling Protocol114
5.2.6Postscript116
5.3CDPD116
5.3.1Introduction116
5.3.2Basic Idea118
5.3.3Basic Infrastructure119
5.3.4How a CDPD Connection Works122
5.3.5CDPD Security125
References129
6Security in 3G and 4G Systems131
6.13G Wireless Communications Systems131
6.2Third Generation Partnership Project (3GPP)133
6.2.13GPP Security Objectives133
6.33G Security Architecture134
6.3.1Network Access Security135
6.3.2Network Domain Security136
6.3.3User Domain Security136
6.3.4Provider-User Link Security136
6.3.5Visibility and Configurability of Security137
6.4Authentication and Key Agreement (AKA) in 3GPP137
6.5Confidentiality and Integrity138
6.5.1Confidentiality139
6.5.2Data Integrity140
6.64G Wireless Communications Systems141
References142
7Wireless Application Protocol (WAP)143
7.1Introduction143
7.2WAP Protocol Stack144
7.3WAP PKI Model147
7.3.1WTLS Class 2148
7.3.2WTLS Class 3 and SignText152
7.4Cipher Suite in WTLS156
7.4.1Key Exchange Suite156
7.4.2Elliptic Curve Parameters in WTLS160
7.4.3Bulk Encryption and MAC Suite161
7.5WAP-Profiled TLS163
7.5.1Cipher Suites164
7.5.2Session ID and Session Resume167
7.5.3Server/Client Authentication and Certificate168
7.5.4TLS Tunneling168
7.6WAP Identity Module169
7.7Further Information170
References171
About the Authors175
Index177
From the B&N Reads Blog

Customer Reviews