Security in wireless communication networks / (Record no. 92400)

000 -LEADER
fixed length control field 07225cam a2200385 i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250902105525.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250902s2022 enkm b a001 0 eng d
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBC1H6381
Source bnb
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119244363
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119244363
Qualifying information (hardcover)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119244366
Qualifying information (hardcover)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781119244394 (ePub ebook)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1285693297
Canceled/invalid control number (OCoLC)1289267052
-- (OCoLC)1289272694
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5103.2
Item number .Q53 2022
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Preferred name for the person Qian, Yi,
Dates associated with a name 1962-
Relator term author.
245 10 - TITLE STATEMENT
Title Security in wireless communication networks /
Statement of responsibility, etc Yi Qian, Feng Ye, Hsiao-Hwa Chen and.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Chichester, West Sussex ;
-- Hoboken :
Name of publisher, distributor, etc Wiley-IEEE Press,
Date of publication, distribution, etc 2022.
300 ## - PHYSICAL DESCRIPTION
Extent xxv, 349 pages :
Other physical details illustrations ;
Dimensions 25 cm.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent.
337 ## - MEDIA TYPE
Media type term unmediated
Source rdamedia.
338 ## - CARRIER TYPE
Carrier type term volume
Source rdacarrier.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - CONTENTS
Formatted contents note Table of Contents<br/>Preface xvii<br/><br/>Acknowledgments xxiii<br/><br/>About the Companion Website xxv<br/><br/>Part I Introduction and Mathematics Background 1<br/><br/>1 Introduction 3<br/><br/>1.1 General Computer Communication Network Architecture 3<br/><br/>1.2 Different Types of Wireless Communication Systems 5<br/><br/>1.3 Network Security and Wireless Security 9<br/><br/>1.4 Summary 11<br/><br/>2 Basic Network Security Concepts 13<br/><br/>2.1 Security Attacks 13<br/><br/>2.2 Security Services 16<br/><br/>2.3 Security Mechanisms 21<br/><br/>2.4 Other Security Concepts 24<br/><br/>2.5 Summary 25<br/><br/>3 Mathematical Background 27<br/><br/>3.1 Basic Concepts in Modern Algebra and Number Theory 27<br/><br/>3.2 Prime Numbers, Modular Arithmetic, and Divisors 30<br/><br/>3.3 Finite Field and Galois Field 34<br/><br/>3.4 Polynomial Arithmetic 35<br/><br/>3.5 Fermat’s Little Theorem, Euler’s Totient Function, and Euler’s Theorem 41<br/><br/>3.6 Primality Testing 44<br/><br/>3.7 Chinese Remainder Theorem 46<br/><br/>3.8 Discrete Logarithm 48<br/><br/>3.9 Summary 49<br/><br/>Part II Cryptographic Systems 51<br/><br/>4 Cryptographic Techniques 53<br/><br/>4.1 Symmetric Encryption 53<br/><br/>4.2 Classical Cryptographic Schemes 53<br/><br/>4.3 Stream Cipher 62<br/><br/>4.4 Modern Block Ciphers 63<br/><br/>4.5 Data Encryption Standard (DES) 67<br/><br/>4.6 Summary 76<br/><br/>5 More on Cryptographic Techniques 77<br/><br/>5.1 Advanced Encryption Standard 77<br/><br/>5.2 Block Cipher Modes of Operation 85<br/><br/>5.3 Public Key Infrastructure 92<br/><br/>5.4 The RSA Algorithm 95<br/><br/>5.5 Diffie–Hellman (D–H) Key Exchange 97<br/><br/>5.6 Summary 99<br/><br/>6 Message Authentication, Digital Signature, and Key Management 101<br/><br/>6.1 Message Authentication 101<br/><br/>6.2 MAC and Hash Algorithms 105<br/><br/>6.3 Digital Signature and Authentication 114<br/><br/>6.4 Key Management 122<br/><br/>6.5 Summary 128<br/><br/>Part III Security for Wireless Local Area Networks 129<br/><br/>7 WLAN Security 131<br/><br/>7.1 Introduction to WLAN 131<br/><br/>7.2 Evolution of WLAN Security 133<br/><br/>7.3 Wired Equivalent Privacy 135<br/><br/>7.4 IEEE 802.1X Authentication Model 140<br/><br/>7.5 IEEE 802.11i Standard 143<br/><br/>7.6 Wi-Fi Protected Access 3 and Opportunistic Wireless Encryption 150<br/><br/>7.7 Summary 152<br/><br/>8 Bluetooth Security 153<br/><br/>8.1 Introduction to Bluetooth 153<br/><br/>8.2 Link Key Generation 157<br/><br/>8.3 Authentication, Confidentiality, and Trust and Service Levels 163<br/><br/>8.4 Cryptographic Functions for Security Modes 1, 2, and 3 166<br/><br/>8.5 Cryptographic Functions in Security Mode 4 (SSP) 173<br/><br/>8.6 Summary 174<br/><br/>9 Zigbee Security 177<br/><br/>9.1 Introduction to Zigbee 177<br/><br/>9.2 IEEE 802.15.4 Security Features 179<br/><br/>9.3 Zigbee Upper Layer Security 182<br/><br/>9.4 Security-Related MAC PIB Attributes 187<br/><br/>9.5 Mechanisms Used in Zigbee Security 188<br/><br/>9.6 Summary 191<br/><br/>10 RFID Security 193<br/><br/>10.1 Introduction to RFID 193<br/><br/>10.2 Security Attacks, Risks, and Objectives of RFID Systems 195<br/><br/>10.3 Mitigation Strategies and Countermeasures for RFID Security Risks 196<br/><br/>10.4 RFID Security Mechanisms 199<br/><br/>10.5 Summary 205<br/><br/>Part IV Security for Wireless Wide Area Networks 207<br/><br/>11 GSM Security 209<br/><br/>11.1 GSM System Architecture 209<br/><br/>11.2 GSM Network Access Security Features 212<br/><br/>11.3 GSM Security Algorithms 215<br/><br/>11.4 Attacks Against GSM Security 225<br/><br/>11.5 Possible GSM Security Improvements 227<br/><br/>11.6 Summary 228<br/><br/>12 UMTS Security 229<br/><br/>12.1 UMTS System Architecture 229<br/><br/>12.2 UMTS Security Features 231<br/><br/>12.3 UMTS Network Access Security 232<br/><br/>12.4 Algorithms in Access Security 240<br/><br/>12.5 Other UMTS Security Features 249<br/><br/>12.6 Summary 250<br/><br/>13 LTE Security 251<br/><br/>13.1 LTE System Architecture 251<br/><br/>13.2 LTE Security Architecture 253<br/><br/>13.3 LTE Security 255<br/><br/>13.4 Handover Between eNBs 261<br/><br/>13.5 Security Algorithms 268<br/><br/>13.6 Security for Interworking Between LTE and Legacy Systems 273<br/><br/>13.7 Summary 278<br/><br/>Part V Security for Next Generation Wireless Networks 279<br/><br/>14 Security in 5G Wireless Networks 281<br/><br/>14.1 Introduction to 5G Wireless Network Systems 281<br/><br/>14.2 5G Security Requirements and Major Drives 283<br/><br/>14.3 A 5G Wireless Security Architecture 287<br/><br/>14.4 5G Wireless Security Services 289<br/><br/>14.5 5G Key Management 300<br/><br/>14.6 Security for New Communication Techniques in 5G 303<br/><br/>14.7 Challenges and Future Directions for 5G Wireless Security 308<br/><br/>14.8 Summary 310<br/><br/>15 Security in V2X Communications 311<br/><br/>15.1 Introduction to V2X Communications 311<br/><br/>15.2 Security Requirements and Possible Attacks in V2X Communications 314<br/><br/>15.3 IEEE WAVE Security Services for Applications and Management Messages 316<br/><br/>15.4 Security in Cellular Based V2X Communications 320<br/><br/>15.5 Cryptography and Privacy Preservation in V2X Communications 323<br/><br/>15.6 Challenges and Future Research Directions 329<br/><br/>15.7 Summary 331<br/><br/>References 333<br/><br/>Index 345
545 0# - BIOGRAPHICAL OR HISTORICAL DATA
Biographical or historical note About the Author<br/>Yi Qian, PhD, is a Professor in the Department of Electrical and Computer Engineering at the University of Nebraska-Lincoln, USA. He is a recipient of the Henry Y. Kleinkauf Family Distinguished New Faculty Teaching Award in 2011, the Holling Family Distinguished Teaching Award in 2012, the Holling Family Distinguished Teaching/Advising/Mentoring Award in 2018, and the Holling Family Distinguished Teaching Award for Innovative Use of Instructional Technology in 2018, all from University of Nebraska-Lincoln, USA.<br/><br/>Feng Ye, PhD, is an Assistant Professor in the Department of Electrical and Computer Engineering at the University of Dayton, USA. He received his PhD from the University of Nebraska-Lincoln, USA, in 2015. He is the author or co-author over 60 technical papers.<br/><br/>Hsiao-Hwa Chen, PhD, is Distinguished Professor in the Department of Engineering Science at the National Cheng Kung University in Taiwan. He received his PhD from the University of Oulu, Finland, in 1991. He is the author or co-author of over 400 technical papers.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Faculty Milestone Recognition Program
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Wireless communication systems
General subdivision Security measures.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ye, Feng,
Dates associated with a name 1989-
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chen, Hsiao-Hwa,
Relator term author.
Real World Object URI https://isni.org/isni/000000011599101X.
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://onlinelibrary.wiley.com/doi/book/10.1002/9781119244400
Link text Full text is available at Wiley Online Library Click here to view
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type EBOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Source of acquisition Full call number Date last seen Price effective from Item type
          COLLEGE LIBRARY COLLEGE LIBRARY 2025-09-02 ALBASA Consortium 005.8 Q15 2021 2025-09-02 2025-09-02 EBOOK