Wireless Security Handbook

版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 http://blog.csdn.net/topmvp - topmvp
The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, andhacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network. This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level, cost-effective ways of deploying wireless across large enterprises, and financial controls that reduce unforeseen risks in wireless projects. The handbook also offers the technical details of how you can design, build, and hack nearly all wireless security components.
http://rapidshare.com/files/39147136/0849333784.rar
http://depositfiles.com/files/1087109
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Preface .............................................................................................................................................xxxii Acknowledgment ...........................................................................................................................xxxiv Section I Security Fundamentals Chapter I Malicious Software in Mobile Devices ...................................................................................................1 Thomas M. Chen, Southern Methodist University, USA Cyrus Peikari, Airscanner Mobile Security Corporation, USA Chapter II Secure Service Discovery .....................................................................................................................11 Sheikh I. Ahamed, Marquette University, USA John F. Buford, Avaya Labs, USA Moushumi Sharmin, Marquette University, USA Munirul M. Haque, Marquette University, USA Nilothpal Talukder, Marquette University, USA Chapter III Security of Mobile Code .......................................................................................................................28 Zbigniew Kotulski, Polish Academy of Sciences, Warsaw, Poland Warsaw University of Technology, Poland Aneta Zwierko, Warsaw University of Technology, Poland Chapter IV Identity Management ............................................................................................................................44 Kumbesan Sandrasegaran, University of Technology, Sydney, Australia Mo Li, University of Technology, Sydney, Australia Table of Contents Chapter V Wireless Wardriving ..............................................................................................................................61 Luca Caviglione, Institute of Intelligent Systems for Automation (ISSIA)—Genoa Branch, Italian National Research Council, Italy Chapter VI Intrusion and Anomaly Detection in Wireless Networks ......................................................................78 Amel Meddeb Makhlouf, University of the 7th of November at Carthage, Tunisia Noureddine Boudriga, University of the 7th of November at Carthage, Tunisia Chapter VII Peer-to-Peer (P2P) Network Security: Firewall Issues .........................................................................95 Lu Yan, University College London, UK Chapter VIII Identity Management for Wireless Service Access .............................................................................104 Mohammad M.R. Chowdhury, University Graduate Center – UniK, Norway Josef Noll, University Graduate Center – UniK, Norway Chapter IX Privacy Enhancing Techniques: A Survey and Classification .............................................................115 Peter Langendörfer, IHP, Germany Michael Masser, IHP, Germany Krzysztof Piotrowski, IHP, Germany Steffen Peter, IHP, Germany Chapter X Vulnerability Analysis and Defenses in Wireless Networks ...............................................................129 Lawan A. Mohammad, King Fahd University of Petroleum and Minerals, Saudi Arabia Biju Issac, Swinburne University of Technology – Sarawak Campus, Malaysia Chapter XI Key Distribution and Management for Mobile Applications .............................................................145 György Kálmán, University Graduate Center – UniK, Norway Josef Noll, University Graduate Center – UniK, Norway Chapter XII Architecture and Protocols for Authentications, Authorization, and Accounting (AAA) in the Future Wireless Communications Networks ............................................................................158 Said Zaghloul, Technical University Carolo-Wilhelmina – Braunschweig, Germany Admela Jukan, Technical University Carolo-Wilhelmina – Braunschweig, Germany Chapter XIII Authentication, Authorisation, and Access Control in Mobile Systems .............................................176 Josef Noll, University Graduate Center – UniK, Norway György Kálmán, University Graduate Center – UniK, Norway Chapter XIV Trustworthy Networks, Authentication, Privacy, and Security Models ..............................................189 Yacine Djemaiel, University of the 7th of November at Carthage, Tunisia Slim Rekhis, University of the 7th of November at Carthage, Tunisia Noureddine Boudriga, University of the 7th of November at Carthage, Tunisia Chapter XV The Provably Secure Formal Methods for Authentication and Key Agreement Protocols ................210 Jianfeng Ma, Xidian University, China Xinghua Li, Xidian University, China Chapter XVI Multimedia Encryption and Watermarking in Wireless Environment ................................................236 Shiguo Lian, France Telecom R&D Beijing, China Chapter XVII System-on-Chip Design of the Whirlpool Hash Function ..................................................................256 Paris Kitsos, Hellenic Open University (HOU), Patras, Greece Section II Security in 3G/B3G/4G Chapter XVIII Security in 4G .....................................................................................................................................272 Artur Hecker, Ecole Nationale Supérieure des Télécommunications (ENST), France Mohamad Badra, National Center for Scientific Research, France Chapter XIX Security Architectures for B3G Mobile Networks ..............................................................................297 Christoforos Ntantogian, University of Athens, Greece Christos Xenakis, University of Piraeus, Greece Chapter XX Security in UMTS 3G Mobile Networks ............................................................................................318 Christos Xenakis, University of Piraeus, Greece Chapter XXI Access Security in UMTS and IMS ....................................................................................................339 Yan Zhang, Simula Research Laboratory, Norway Yifan Chen, University of Greenwich, UK Rong Yu, South China University of Technology, China Supeng Leng, University of Electronic Science and Technology of China, China Huansheng Ning, Beihang University, China Tao Jiang, Huazhong University of Science and Technology, China Chapter XXII Security in 2.5G Mobile Systems .......................................................................................................351 Christos Xenakis, University of Piraeus, Greece Chapter XXIII End-to-End Security Comparisons Between IEEE 802.16e and 3G Technologies ............................364 Sasan Adibi, University of Waterloo, Canada Gordon B. Agnew, University of Waterloo, Canada Chapter XXIV Generic Application Security in Current and Future Networks ..........................................................379 Silke Holtmanns, Nokia Research Center, Finland Pekka Laitinen, Nokia Research Center, Finland Chapter XXV Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments ........................................................................................................395 Sangheon Pack, Korea University, South Korea Sungmin Baek, Seoul National University, South Korea Taekyoung Kwon, Seoul National University, South Korea Yanghee Choi, Seoul National University, South Korea Section III Security in Ad Hoc and Sensor Networks Chapter XXVI Security in Mobile Ad Hoc Networks .................................................................................................413 Bin Lu, West Chester University, USA Chapter XXVII Privacy and Anonymity in Mobile Ad Hoc Networks ........................................................................431 Christer Andersson, Combitech, Sweden Leonardo A. Martucci, Karlstad University, Sweden Simone Fischer-Hübner, Karlstad University, Sweden Chapter XXVIII Secure Routing with Reputation in MANET ......................................................................................449 Tomasz Ciszkowski, Warsaw University, Poland Zbigniew Kotulski, Warsaw University, Poland Chapter XXIX Trust Management and Context-Driven Access Control ....................................................................461 Paolo Bellavista, University of Bologna, Italy Rebecca Montanari, University of Bologna, Italy Daniela Tibaldi, University of Bologna, Italy Alessandra Toninelli, University of Bologna, Italy Chapter XXX A Survey of Key Management in Mobile Ad Hoc Networks .............................................................479 Bing Wu, Fayetteville State University, USA Jie Wu, Florida Atlantic University, USA Mihaela Cardei, Florida Atlantic University, USA Chapter XXXI Security Measures for Mobile Ad-Hoc Networks (MANETs) ...........................................................500 Sasan Adibi, University of Waterloo, Canada Gordon B. Agnew, University of Waterloo, Canada Chapter XXXII A Novel Secure Video Surveillance System Over Wireless Ad-Hoc Networks .................................515 Hao Yin, Tsinghua University, China Chuang Lin, Tsinghua University, China Zhijia Chen, Tsinghua University, China Geyong Min, University of Bradford, UK Chapter XXXIII Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks ..................................531 John Felix Charles Joseph, Nanyang Technological University, Singapore Amitabha Das, Nanyang Technological University, Singapore Boot-Chong Seet, Auckland Univerisity of Technology, New Zealand Bu-Sung Lee, Nanyang Technological University, Singapore Chapter XXXIV Security in Wireless Sensor Networks ................................................................................................547 Luis E. Palafox, CICESE Research Center, Mexico J. Antonio Garcia-Macias, CICESE Research Center, Mexico Chapter XXXV Security and Privacy in Wireless Sensor Networks: Challenges and Solutions .................................565 Mohamed Hamdi, University of November 7th at Carthage, Tunisia Noreddine Boudriga, University of November 7th at Carthage, Tunisia Chapter XXXVI Routing Security in Wireless Sensor Networks ..................................................................................582 A.R. Naseer, King Fahd University of Petroleum & Minerials, Dhahran Ismat K. Maarouf, King Fahd University of Petroleum & Minerials, Dhahran Ashraf S. Hasan, King Fahd University of Petroleum & Minerials, Dhahran Chapter XXXVII Localization Security in Wireless Sensor Networks ...........................................................................617 Yawen Wei, Iowa State University, USA Zhen Yu, Iowa State University, USA Yong Guan, Iowa State University, USA Chapter XXXVIII Resilience Against False Data Injection Attack in Wireless Sensor Networks ...................................628 Miao Ma, The Hong Kong University of Science and Technology, Hong Kong Chapter XXXIX Survivability of Sensors with Key and Trust Management ................................................................636 Jean-Marc Seigneur, University of Genev, Switzerland Luminita Moraru, University of Genev, Switzerland Olivier Powell, University of Patras, Greece Chapter XL Fault Tolerant Topology Design for Ad Hoc and Sensor Networks ...................................................652 Yu Wang, University of North Carolina at Charlotte, USA Section IV Security in Wireless PAN/LAN/MAN Networks Chapter XLI Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections ..............666 Georgios Kambourakis, University of the Aegean, Greece Angelos Rouskas, University of the Aegean, Greece Stefanos Gritzalis, University of the Aegean, Greece Chapter XLII Bluetooth Devices Effect on Radiated EMS of Vehicle Wiring .........................................................681 Miguel A. Ruiz, University of Alcala, Spain Felipe Espinosa, University of Alcala, Spain David Sanguino, University of Alcala, Spain AbdelBaset M.H. Awawdeh, University of Alcala, Spain Chapter XLIII Security in WLAN ..............................................................................................................................695 Mohamad Badra, Bât ISIMA, France Artur Hecker, INFRES-ENST, France Chapter XLIV Access Control in Wireless Local Area Networks: Fast Authentication Schemes .............................710 Jahan Hassan, The University of Sydney, Australia Björn Landfeldt, The University of Sydney, Australia Albert Y. Zomaya, The University of Sydney, Australia Chapter XLV Security and Privacy in RFID Based Wireless Networks ...................................................................723 Denis Trček, University of Ljubljana, Slovenia Chapter XLVI Security and Privacy Approaches for Wireless Local and Metropolitan Area Networks (LANs & MANS) ......................................................................................................732 Giorgos Kostopoulos, University of Patras, Greece Nicolas Sklavos, Technological Educational Institute of Mesolonghi, Greece Odysseas Koufopavlou, University of Patras, Greece Chapter XLVII End-to-End (E2E) Security Approach in WiMAX: A Security Technical Overview for Corporate Multimedia Applications ...........................................747 Sasan Adibi, University of Waterloo, Canada Gordon B. Agnew, University of Waterloo, Canada Tom Tofigh, WiMAX Forum, USA Chapter XLVIII Evaluation of Security Architectures for Mobile Broadband Access .................................................759 Symeon Chatzinotas, University of Surrey, UK Jonny Karlsson, Arcada University of Applied Sciences, Finland Göran Pulkkis, Arcada University of Applied Sciences, Finland Kaj Grahn, Arcada University of Applied Sciences, Finland

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值