Cover image for Wireless communications security
Title:
Wireless communications security
Personal Author:
Series:
Universal personal communications
Publication Information:
Norwood, MA : Artech House, 2006
ISBN:
9781580535205

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000003589367 TK5103.2 I42 2006 Open Access Book Book
Searching...
Searching...
30000010183377 TK5103.2 I42 2006 Open Access Book Book
Searching...
Searching...
30000010107947 TK5103.2 I42 2006 Open Access Book Book
Searching...

On Order

Summary

Summary

This cutting-edge resource offers a broad overview of wireless security, as well as a solid understanding of critical cryptography techniques and the methods used to implement an effective cryptography architecture for any organization.


Author Notes

Hideki Imai is a full professor at the Institute of Industrial Science, University of Tokyo.


Table of Contents

Prefacep. xi
1 Introductionp. 1
2 Cryptographyp. 5
2.1 Introductionp. 5
2.2 Basic Conceptsp. 5
2.2.1 Ciphertext and Plaintextp. 5
2.2.2 Types of Cryptosystemsp. 6
2.2.3 Goals of a Cryptosystemp. 7
2.2.4 Securityp. 8
2.3 Symmetric Encryption Schemesp. 9
2.4 Perfect Secrecy: The One-Time Padp. 9
2.5 Block Ciphersp. 11
2.5.1 Permutationp. 11
2.5.2 Substitutionp. 12
2.5.3 Diffusion/Confusionp. 13
2.5.4 SP Networksp. 14
2.5.5 Basic Structurep. 14
2.5.6 Modes of Usep. 15
2.5.7 DESp. 17
2.5.8 AESp. 18
2.6 Stream Ciphersp. 19
2.6.1 Advantagesp. 20
2.6.2 Security Remarksp. 20
2.6.3 Some Examplesp. 21
2.7 Asymmetric Cryptosystems and Digital Signaturesp. 21
2.7.1 Public-Key Encryptionp. 22
2.7.2 Public Key Infrastructure (PKI) and Certificate Authorities (CA)p. 23
2.7.3 Mathematical Backgroundp. 25
2.7.4 Diffie-Hellman Key Agreementp. 27
2.7.5 RSA Cryptosystemp. 28
2.7.6 ElGamal Cryptosystemp. 29
2.7.7 Necessary Security for Practical Public Key Encryption Systemsp. 31
2.7.8 Digital Signaturep. 32
2.7.9 Mathematical Backgroundp. 33
2.7.10 RSA Signature Schemep. 35
2.7.11 Digital Signature Algorithm (DSA)p. 36
2.7.12 Necessary Security for Practical Digital Signature Systemsp. 36
Referencesp. 38
3 Security Features in Wireless Environmentp. 41
3.1 Introductionp. 41
3.2 Mobile Network Environmentp. 42
3.3 General Security Threats of a Networkp. 44
3.4 Limitations of Mobile Environmentp. 45
3.5 Mobility and Securityp. 46
3.6 Attacks in Mobile Environmentp. 46
3.6.1 Nuisance Attackp. 47
3.6.2 Impersonation Attackp. 48
3.6.3 Interception Attackp. 48
3.6.4 Replay Attackp. 48
3.6.5 Parallel Session Attackp. 48
3.7 Security Issues in Mobile Environmentp. 49
3.7.1 Authenticationp. 49
3.7.2 Anonymityp. 50
3.7.3 Device Vulnerabilityp. 52
3.7.4 Domain Boundary Crossingp. 52
Referencesp. 53
4 Standard Protocolsp. 55
4.1 IEEE 802.11p. 55
4.1.1 Brief Historyp. 55
4.1.2 IEEE802.11 Architecturep. 56
4.1.3 IEEE 802.11 Layersp. 60
4.1.4 Security of IEEE 802.11p. 62
4.1.5 Key Managementp. 69
4.1.6 Weaknesses of WEPp. 70
4.2 Bluetoothp. 72
4.2.1 Bluetooth Overviewp. 72
4.2.2 Brief Historyp. 73
4.2.3 Benefitsp. 74
4.2.4 Bluetooth Architecture and Componentsp. 76
4.2.5 Security of Bluetoothp. 78
4.2.6 Problems in the Security of Bluetoothp. 89
Referencep. 90
5 Security in 2G Systemsp. 91
5.1 GSM Systemp. 92
5.1.1 Introductionp. 92
5.1.2 Architecture of the GSM Networkp. 93
5.1.3 GSM Security Featuresp. 96
5.1.4 Attacks on GSM Securityp. 103
5.2 I-mode Introductionp. 106
5.2.1 Introductionp. 106
5.2.2 I-mode System Overviewp. 107
5.2.3 SSL Overviewp. 108
5.2.4 Protocol Stackp. 110
5.2.5 HTTP Tunneling Protocolp. 114
5.2.6 Postscriptp. 116
5.3 CDPDp. 116
5.3.1 Introductionp. 116
5.3.2 Basic Ideap. 118
5.3.3 Basic Infrastructurep. 119
5.3.4 How a CDPD Connection Worksp. 122
5.3.5 CDPD Securityp. 125
Referencesp. 129
6 Security in 3G and 4G Systemsp. 131
6.1 3G Wireless Communications Systemsp. 131
6.2 Third Generation Partnership Project (3GPP)p. 133
6.2.1 3GPP Security Objectivesp. 133
6.3 3G Security Architecturep. 134
6.3.1 Network Access Securityp. 135
6.3.2 Network Domain Securityp. 136
6.3.3 User Domain Securityp. 136
6.3.4 Provider-User Link Securityp. 136
6.3.5 Visibility and Configurability of Securityp. 137
6.4 Authentication and Key Agreement (AKA) in 3GPPp. 137
6.5 Confidentiality and Integrityp. 138
6.5.1 Confidentialityp. 139
6.5.2 Data Integrityp. 140
6.6 4G Wireless Communications Systemsp. 141
Referencesp. 142
7 Wireless Application Protocol (WAP)p. 143
7.1 Introductionp. 143
7.2 WAP Protocol Stackp. 144
7.3 WAP PKI Modelp. 147
7.3.1 WTLS Class 2p. 148
7.3.2 WTLS Class 3 and SignTextp. 152
7.4 Cipher Suite in WTLSp. 156
7.4.1 Key Exchange Suitep. 156
7.4.2 Elliptic Curve Parameters in WTLSp. 160
7.4.3 Bulk Encryption and MAC Suitep. 161
7.5 WAP-Profiled TLSp. 163
7.5.1 Cipher Suitesp. 164
7.5.2 Session ID and Session Resumep. 167
7.5.3 Server/Client Authentication and Certificatep. 168
7.5.4 TLS Tunnelingp. 168
7.6 WAP Identity Modulep. 169
7.7 Further Informationp. 170
Referencesp. 171
About the Authorsp. 175
Indexp. 177