Vai al contenuto principale della pagina
Titolo: | Wireless and mobile networks security [[electronic resource] ] : security basics, security in on-the-shelf and emerging technologies / / edited by Hakima Chaouchi, Maryline Laurent-Maknavicius |
Pubblicazione: | London, : ISTE |
Hoboken, NJ, : John Wiley & Sons, 2009 | |
Descrizione fisica: | 1 online resource (689 p.) |
Disciplina: | 005.8 |
Soggetto topico: | Wireless communication systems - Security measures |
Mobile communication systems - Security measures | |
Soggetto genere / forma: | Electronic books. |
Altri autori: | ChaouchiHakima Laurent-MaknaviciusMaryline |
Note generali: | Description based upon print version of record. |
Nota di bibliografia: | Includes bibliographical references and index. |
Nota di contenuto: | Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies; Table of Contents; Introduction; Part 1. Basic Concepts; Chapter 1. Introduction to Mobile and Wireless Networks; 1.1. Introduction; 1.2. Mobile cellular networks; 1.2.1. Introduction; 1.2.2. Cellular network basic concepts; 1.2.3. First generation (1G) mobile; 1.2.4. Second generation (2G) mobile; 1.2.5. Third generation (3G) mobile; 1.3. IEEE wireless networks; 1.3.1. Introduction; 1.3.2. WLAN: IEEE 802.11; 1.3.3. WPAN: IEEE 802.15; 1.3.4. WMAN: IEEE 802.16 |
1.3.5. WMAN mobile: IEEE 802.201.3.6. MIH: IEEE 802.21; 1.3.7. WRAN: IEEE 802.22; 1.4. Mobile Internet networks; 1.4.1. Introduction; 1.4.2. Macro mobility; 1.4.3. Micro mobility; 1.4.4. Personal mobility and SIP; 1.4.5. Identity based mobility; 1.4.6. NEMO and MANET networks; 1.5. Current trends; 1.5.1. All-IP, IMS and FMC; 1.5.2. B3G and 4G; 1.5.3. Applications; 1.6. Conclusions; 1.7. Bibliography; Chapter 2. Vulnerabilities of Wired and Wireless Networks; 2.1. Introduction; 2.2. Security in the digital age; 2.2.1. Private property: from vulnerabilities to risks | |
2.2.2. Definition of security2.2.3. Trust and subjectivity in security; 2.2.4. Services and security; 2.3. Threats and risks to telecommunications systems; 2.3.1. Role of telecommunications systems; 2.3.2. Threat models in telecommunications systems; 2.3.3. Homogenity vs. heterogenity; 2.3.4. The Internet and security; 2.3.5. The role of the medium; 2.3.6. Risks to the infrastructure; 2.3.7. Personal risks; 2.4. From wireline vulnerabilities to vulnerabilities in wireless communications; 2.4.1. Changing the medium; 2.4.2. Wireless terminals; 2.4.3. New services; 2.5. Conclusions | |
2.6. BibliographyChapter 3. Fundamental Security Mechanisms; 3.1. Introduction; 3.2. Basics on security; 3.2.1. Security services; 3.2.2. Symmetric and asymmetric cryptography; 3.2.3. Hash functions; 3.2.4. Electronic signatures and MAC; 3.2.5. Public Key Infrastructure (PKI) and electronic certificates; 3.2.6. Management of cryptographic keys; 3.2.7. Cryptographic protocols; 3.3. Secure communication protocols and VPN implementation; 3.3.1. Secure Socket Layer (SSL) and Transport Layer Security (TLS); 3.3.2. IPsec protocol suite; 3.3.3. Comparison between SSL and IPsec security protocols | |
3.3.4. IPsec VPN and SSL VPN3.4. Authentication; 3.4.1. Authentication mechanisms.; 3.4.2. AAA protocols to control access to a private network or an operator's network; 3.5. Access control; 3.5.1. Firewalls; 3.5.2. Intrusion detection; 3.6. Conclusions; 3.7. Bibliography; Chapter 4. Wi-Fi Security Dedicated Architectures; 4.1. Introduction; 4.2. Hot spot architecture: captive portals; 4.2.1. Overview; 4.2.2. Captive portal overview; 4.2.3. Security analysis; 4.2.4. Conclusions; 4.3. Wireless intrusion detection systems (WIDS); 4.3.1. Introduction | |
4.3.2. Wireless intrusion detection systems architectures | |
Sommario/riassunto: | This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This material will be of invaluable use to all those working in the network security field, and especially to the many people entering the field. The next area of focus is on the security issues and available solutions associated with off-the-shelf wireless and mo |
Titolo autorizzato: | Wireless and mobile networks security |
ISBN: | 1-282-69149-X |
9786612691492 | |
0-470-61188-X | |
0-470-61028-X | |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910139512903321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |