Title:
Wireless communications security
Personal Author:
Series:
Universal personal communications
Publication Information:
Norwood, MA : Artech House, 2006
ISBN:
9781580535205
Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000003589367 | TK5103.2 I42 2006 | Open Access Book | Book | Searching... |
Searching... | 30000010183377 | TK5103.2 I42 2006 | Open Access Book | Book | Searching... |
Searching... | 30000010107947 | TK5103.2 I42 2006 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
This cutting-edge resource offers a broad overview of wireless security, as well as a solid understanding of critical cryptography techniques and the methods used to implement an effective cryptography architecture for any organization.
Author Notes
Hideki Imai is a full professor at the Institute of Industrial Science, University of Tokyo.
Table of Contents
Preface | p. xi |
1 Introduction | p. 1 |
2 Cryptography | p. 5 |
2.1 Introduction | p. 5 |
2.2 Basic Concepts | p. 5 |
2.2.1 Ciphertext and Plaintext | p. 5 |
2.2.2 Types of Cryptosystems | p. 6 |
2.2.3 Goals of a Cryptosystem | p. 7 |
2.2.4 Security | p. 8 |
2.3 Symmetric Encryption Schemes | p. 9 |
2.4 Perfect Secrecy: The One-Time Pad | p. 9 |
2.5 Block Ciphers | p. 11 |
2.5.1 Permutation | p. 11 |
2.5.2 Substitution | p. 12 |
2.5.3 Diffusion/Confusion | p. 13 |
2.5.4 SP Networks | p. 14 |
2.5.5 Basic Structure | p. 14 |
2.5.6 Modes of Use | p. 15 |
2.5.7 DES | p. 17 |
2.5.8 AES | p. 18 |
2.6 Stream Ciphers | p. 19 |
2.6.1 Advantages | p. 20 |
2.6.2 Security Remarks | p. 20 |
2.6.3 Some Examples | p. 21 |
2.7 Asymmetric Cryptosystems and Digital Signatures | p. 21 |
2.7.1 Public-Key Encryption | p. 22 |
2.7.2 Public Key Infrastructure (PKI) and Certificate Authorities (CA) | p. 23 |
2.7.3 Mathematical Background | p. 25 |
2.7.4 Diffie-Hellman Key Agreement | p. 27 |
2.7.5 RSA Cryptosystem | p. 28 |
2.7.6 ElGamal Cryptosystem | p. 29 |
2.7.7 Necessary Security for Practical Public Key Encryption Systems | p. 31 |
2.7.8 Digital Signature | p. 32 |
2.7.9 Mathematical Background | p. 33 |
2.7.10 RSA Signature Scheme | p. 35 |
2.7.11 Digital Signature Algorithm (DSA) | p. 36 |
2.7.12 Necessary Security for Practical Digital Signature Systems | p. 36 |
References | p. 38 |
3 Security Features in Wireless Environment | p. 41 |
3.1 Introduction | p. 41 |
3.2 Mobile Network Environment | p. 42 |
3.3 General Security Threats of a Network | p. 44 |
3.4 Limitations of Mobile Environment | p. 45 |
3.5 Mobility and Security | p. 46 |
3.6 Attacks in Mobile Environment | p. 46 |
3.6.1 Nuisance Attack | p. 47 |
3.6.2 Impersonation Attack | p. 48 |
3.6.3 Interception Attack | p. 48 |
3.6.4 Replay Attack | p. 48 |
3.6.5 Parallel Session Attack | p. 48 |
3.7 Security Issues in Mobile Environment | p. 49 |
3.7.1 Authentication | p. 49 |
3.7.2 Anonymity | p. 50 |
3.7.3 Device Vulnerability | p. 52 |
3.7.4 Domain Boundary Crossing | p. 52 |
References | p. 53 |
4 Standard Protocols | p. 55 |
4.1 IEEE 802.11 | p. 55 |
4.1.1 Brief History | p. 55 |
4.1.2 IEEE802.11 Architecture | p. 56 |
4.1.3 IEEE 802.11 Layers | p. 60 |
4.1.4 Security of IEEE 802.11 | p. 62 |
4.1.5 Key Management | p. 69 |
4.1.6 Weaknesses of WEP | p. 70 |
4.2 Bluetooth | p. 72 |
4.2.1 Bluetooth Overview | p. 72 |
4.2.2 Brief History | p. 73 |
4.2.3 Benefits | p. 74 |
4.2.4 Bluetooth Architecture and Components | p. 76 |
4.2.5 Security of Bluetooth | p. 78 |
4.2.6 Problems in the Security of Bluetooth | p. 89 |
Reference | p. 90 |
5 Security in 2G Systems | p. 91 |
5.1 GSM System | p. 92 |
5.1.1 Introduction | p. 92 |
5.1.2 Architecture of the GSM Network | p. 93 |
5.1.3 GSM Security Features | p. 96 |
5.1.4 Attacks on GSM Security | p. 103 |
5.2 I-mode Introduction | p. 106 |
5.2.1 Introduction | p. 106 |
5.2.2 I-mode System Overview | p. 107 |
5.2.3 SSL Overview | p. 108 |
5.2.4 Protocol Stack | p. 110 |
5.2.5 HTTP Tunneling Protocol | p. 114 |
5.2.6 Postscript | p. 116 |
5.3 CDPD | p. 116 |
5.3.1 Introduction | p. 116 |
5.3.2 Basic Idea | p. 118 |
5.3.3 Basic Infrastructure | p. 119 |
5.3.4 How a CDPD Connection Works | p. 122 |
5.3.5 CDPD Security | p. 125 |
References | p. 129 |
6 Security in 3G and 4G Systems | p. 131 |
6.1 3G Wireless Communications Systems | p. 131 |
6.2 Third Generation Partnership Project (3GPP) | p. 133 |
6.2.1 3GPP Security Objectives | p. 133 |
6.3 3G Security Architecture | p. 134 |
6.3.1 Network Access Security | p. 135 |
6.3.2 Network Domain Security | p. 136 |
6.3.3 User Domain Security | p. 136 |
6.3.4 Provider-User Link Security | p. 136 |
6.3.5 Visibility and Configurability of Security | p. 137 |
6.4 Authentication and Key Agreement (AKA) in 3GPP | p. 137 |
6.5 Confidentiality and Integrity | p. 138 |
6.5.1 Confidentiality | p. 139 |
6.5.2 Data Integrity | p. 140 |
6.6 4G Wireless Communications Systems | p. 141 |
References | p. 142 |
7 Wireless Application Protocol (WAP) | p. 143 |
7.1 Introduction | p. 143 |
7.2 WAP Protocol Stack | p. 144 |
7.3 WAP PKI Model | p. 147 |
7.3.1 WTLS Class 2 | p. 148 |
7.3.2 WTLS Class 3 and SignText | p. 152 |
7.4 Cipher Suite in WTLS | p. 156 |
7.4.1 Key Exchange Suite | p. 156 |
7.4.2 Elliptic Curve Parameters in WTLS | p. 160 |
7.4.3 Bulk Encryption and MAC Suite | p. 161 |
7.5 WAP-Profiled TLS | p. 163 |
7.5.1 Cipher Suites | p. 164 |
7.5.2 Session ID and Session Resume | p. 167 |
7.5.3 Server/Client Authentication and Certificate | p. 168 |
7.5.4 TLS Tunneling | p. 168 |
7.6 WAP Identity Module | p. 169 |
7.7 Further Information | p. 170 |
References | p. 171 |
About the Authors | p. 175 |
Index | p. 177 |