Bulletproof Wireless Security -  Praphul Chandra

Bulletproof Wireless Security (eBook)

GSM, UMTS, 802.11, and Ad Hoc Security
eBook Download: PDF
2011 | 1. Auflage
272 Seiten
Elsevier Science (Verlag)
978-0-08-047631-5 (ISBN)
Systemvoraussetzungen
56,23 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Finally--a single volume guide to really effective security for both voice and data wireless networks!

More and more data and voice communications are going via wireless at some point between the sender and intended recipient. As a result, truly bulletproof wireless security is now more than a desirable feature--instead, it's a necessity to protect essential personal and business data from hackers and eavesdroppers.

In this handy reference, Praphul Chandra gives you the conceptual and practical tools every RF, wireless, and network engineer needs for high-security wireless applications.

Book Review From EDN Magazine:
http://www.edn.com/article/CA632302.html?industryid=2817

Inside this book you'll find coverage of these essential topics:

+ Cryptographic protocols used in wireless networks.
+ Key-based protocols, including key exchange and authentication techniques
+ Various types of wireless network attacks, including reflection, session hijacks, and Fluhrer-Mantin-Shamir (FMS) attacks.
+ Encryption/decryption standards and methods.
+ Multi-layered security architectures.
+ Secure sockets layer (SSL) and transport layer security (TLS) protocols.
+ Cellular telephone network architectures and their vulnerabilities.
+ Modulation techniques, such as direct-sequence spread spectrum (DSSS) and orthogonal frequency division multiplexing (OFDM).

And you'll also find coverage on such cutting-edge topics as security techniques for ad hoc networks and protecting Bluetooth networks. If you're serious about wireless security, then this title belongs on your reference bookshelf!
Finally--a single volume guide to really effective security for both voice and data wireless networks!More and more data and voice communications are going via wireless at some point between the sender and intended recipient. As a result, truly "e;bulletproof"e; wireless security is now more than a desirable feature--instead, it's a necessity to protect essential personal and business data from hackers and eavesdroppers. In this handy reference, Praphul Chandra gives you the conceptual and practical tools every RF, wireless, and network engineer needs for high-security wireless applications. - Inside this book you'll find coverage of these essential topics: + Cryptographic protocols used in wireless networks. + Key-based protocols, including key exchange and authentication techniques + Various types of wireless network attacks, including reflection, session hijacks, and Fluhrer-Mantin-Shamir (FMS) attacks. + Encryption/decryption standards and methods. + Multi-layered security architectures. + Secure sockets layer (SSL) and transport layer security (TLS) protocols. + Cellular telephone network architectures and their vulnerabilities. + Modulation techniques, such as direct-sequence spread spectrum (DSSS) and orthogonal frequency division multiplexing (OFDM)- And you'll also find coverage on such cutting-edge topics as security techniques for ad hoc networks and protecting Bluetooth networks. If you're serious about wireless security, then this title belongs on your reference bookshelf!

Cover 1
Contents 7
Preface 11
... but where does the voice go?Ž 11
A Brief History of Wireless 12
A Brief History of Security 14
Moving On 22
Reading Conventions 23
How to Read this Book? 23
Acknowledgments 25
Acronyms 27
About the Author 33
Chapter 1 Security and Cryptography 35
1.1 What is Security? 35
1.2 Cryptography 37
1.2.1 Confidentiality 37
1.2.2 Integrity 43
1.2.3 Authentication 45
1.2.4 Replay Protection and Nonrepudiation 47
1.3 Cryptanalysis 47
1.4 Block Ciphers 48
1.4.1 Using the Ciphers: The Modes 49
1.5 Stream Ciphers 52
1.6 How Secure is Cryptography? 56
1.6.1 Strength of a Cipher 56
1.6.2 Key-Length: How Long is Secure? 57
1.7 Beyond Cryptography 58
1.7.1 Firewalls 58
1.7.2 Denial of Service Attacks 59
1.7.3 Code Security 60
1.7.4 Steganography 61
1.8 Conclusion 62
Chapter 2: Network Security Protocols 63
2.1 Introduction 63
2.2 Key Establishment Protocols 63
2.2.1 Key Generation in SKC 64
2.2.2 Key Distribution in SKC 64
2.2.3 Key Establishment in PKC 65
2.2.4 Diffie-Hellman Key Exchange 67
2.2.5 Enhanced Diffie-Hellman Key Exchange 69
2.2.6 RSA 69
2.3 Authentication Protocols 72
2.3.1 Address-Based Authentication 72
2.3.2 Passwords for Local Authentication (Login) 73
2.3.3 Passwords for Network Authentication 75
2.3.4 Authentication Using SKC 76
2.3.5 Authentication Using PKC 81
2.3.6 What to Use for Authentication: SKC or PKC? 82
2.3.7 Session Hijacking 83
2.3.8 Needham Schroeder 85
2.3.9 Kerberos 86
2.4 Encryption Protocols 88
2.4.1 DES 90
2.4.2 TripleDES or 3DES 90
2.4.3 AES 93
2.4.4 RC4 94
2.5 Integrity Protocols 95
2.5.1 CBC Residue 95
2.5.2 CRC32 96
2.5.3 MD5 97
Chapter 3: Security and the Layered Architecture 101
3.1 Introduction 101
3.2 Security at Layer 1 102
3.3 Security at Layer 2 103
3.3.1 Extensible Authentication Protocol (EAP) 103
3.3.2 EAPoL: EAP Over LAN 106
3.3.3 EAP-TLS: TLS Handshake Over EAP 107
3.4 Security at Layer 3 109
3.5 Security at Layer 4: SSL/TLS 114
3.6 Security at Layer 5+ 118
Chapter 4: Voice-Oriented Wireless Networks 119
4.1 The Wireless Medium 120
4.1.1 Radio Propagation Effects 120
4.1.2 Hidden Terminal Problem 122
4.1.3 Exposed Terminal Problem 123
4.1.4 Bandwidth 123
4.1.5 Other Constraints 124
4.2 The Cellular Architecture 124
4.3 TWNs: First Generation 127
4.3.1 Addresses in AMPS 130
4.3.2 Call Setup in AMPS 131
4.4 TWNs: Second Generation 132
4.4.1 Addresses in GSM 136
4.4.2 Call Setup in GSM 137
4.5 TWNs: Third Generation 138
4.5.1 Connection Setup in UMTS 140
4.6 The Overall Picture 141
Chapter 5: Data-Oriented Wireless Networks 143
5.1 WLANs 143
5.1.1: Addresses in 802.11 148
5.1.2 Connection Setup in 802.11 148
5.1.3 Media Access 151
5.1.4 Spectrum Efficiency in 802.11 154
5.2 MANETs 155
5.2.1 MAC for MANETs 157
5.2.2 Routing in MANETs. 158
5.2.3 Address Allocation in MANETs 160
5.2.4 Security in MANETs 161
5.3 Wireless Networks in the Near Future 161
Chapter 6: Security in Traditional Wireless Networks 163
6.1 Security in First Generation TWNs 163
6.2 Security in Second Generation TWNs 163
6.2.1 Anonymity in GSM 164
6.2.2 Key Establishment in GSM 165
6.2.3 Authentication in GSM 166
6.2.4 Confidentiality in GSM 170
6.2.5 What’s Wrong with GSM Security? 171
6.3 Security in 2.5 Generation TWNs 174
6.3.1 WAP 176
6.3.2 Code Security 178
6.4 Security in 3G TWNs 178
6.4.1 Anonymity in UMTS 178
6.4.2 Key Establishment in UMTS 180
6.4.3 Authentication in UMTS 180
6.4.4 Confidentiality in UMTS 184
6.4.5 Integrity Protection in UMTS 185
6.4.6 Putting the Pieces Together 186
6.4.7 Network Domain Security 189
6.5 Summary 192
Chapter 7: Security in Wireless Local Area Networks 193
7.1 Introduction 193
7.2 Key Establishment in 802.11 194
7.2.1 What’s Wrong? 194
7.3 Anonymity in 802.11 195
7.4 Authentication in 802.11 196
7.4.1 Open System Authentication 198
7.4.2 Shared Key Authentication 199
7.4.3 Authentication and Handoffs 200
7.4.4 What’s Wrong with 802.11 Authentication? 201
7.4.5 Pseudo-Authentication Schemes 202
7.5 Confidentiality in 802.11 203
7.5.1 What’s Wrong with WEP? 204
7.6 Data Integrity in 802.11 208
7.7 Loopholes in 802.11 Security 210
7.8 WPA 211
7.8.1 Key Establishment 212
7.8.2 Authentication 217
7.8.3 Confidentiality 220
7.8.4 Integrity 221
7.8.5 The Overall Picture: Confidentiality + Integrity 223
7.8.6 How Does WPA Fix WEP Loopholes? 223
7.9 WPA2 (802.11i) 224
7.9.1 Key Establishment 224
7.9.2 Authentication 225
7.9.3 Confidentiality 225
7.9.4 Integrity 227
7.9.5 The Overall Picture: Confidentiality + Integrity 227
Chapter 8: Security in Wireless Ad Hoc Networks 233
8.1 Introduction 233
8.2 Routing in Multihop Ad Hoc Networks 235
8.2.1 Proactive Routing 235
8.2.2 Reactive Routing 236
8.2.3 Hybrid Routing 236
8.2.4. Routing Attacks 236
8.2.5 Secure Routing 237
8.3 Key Establishment and Authentication 239
8.3.1 Threshold Secret Sharing 239
8.4 Confidentiality and Integrity 244
8.5 Bluetooth 244
8.5.1 Bluetooth Basics 245
8.5.2 Security Modes 247
8.5.3 Key Establishment 250
8.5.4 Authentication 257
8.5.5 Confidentiality 258
8.5.6 Integrity Protection 261
8.5.7 Enhancements 261
References 263
Index 265

Erscheint lt. Verlag 15.3.2011
Sprache englisch
Themenwelt Sachbuch/Ratgeber
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
ISBN-10 0-08-047631-7 / 0080476317
ISBN-13 978-0-08-047631-5 / 9780080476315
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90