Security in wireless communication networks / Yi Qian, Feng Ye, Hsiao-Hwa Chen and.

By: Qian, Yi, 1962- [author.]
Contributor(s): Ye, Feng, 1989- [author.] | Chen, Hsiao-Hwa [author.]
Language: English Publisher: Chichester, West Sussex ; Hoboken : Wiley-IEEE Press, 2022Description: xxv, 349 pages : illustrations ; 25 cmContent type: text Media type: unmediated Carrier type: volumeISBN: 9781119244363 ; 9781119244363; 1119244366Subject(s): Faculty Milestone Recognition Program | Wireless communication systems -- Security measuresGenre/Form: Electronic books.DDC classification: 005.8 LOC classification: TK5103.2 | .Q53 2022Online resources: Full text is available at Wiley Online Library Click here to view
Contents:
Table of Contents Preface xvii Acknowledgments xxiii About the Companion Website xxv Part I Introduction and Mathematics Background 1 1 Introduction 3 1.1 General Computer Communication Network Architecture 3 1.2 Different Types of Wireless Communication Systems 5 1.3 Network Security and Wireless Security 9 1.4 Summary 11 2 Basic Network Security Concepts 13 2.1 Security Attacks 13 2.2 Security Services 16 2.3 Security Mechanisms 21 2.4 Other Security Concepts 24 2.5 Summary 25 3 Mathematical Background 27 3.1 Basic Concepts in Modern Algebra and Number Theory 27 3.2 Prime Numbers, Modular Arithmetic, and Divisors 30 3.3 Finite Field and Galois Field 34 3.4 Polynomial Arithmetic 35 3.5 Fermat’s Little Theorem, Euler’s Totient Function, and Euler’s Theorem 41 3.6 Primality Testing 44 3.7 Chinese Remainder Theorem 46 3.8 Discrete Logarithm 48 3.9 Summary 49 Part II Cryptographic Systems 51 4 Cryptographic Techniques 53 4.1 Symmetric Encryption 53 4.2 Classical Cryptographic Schemes 53 4.3 Stream Cipher 62 4.4 Modern Block Ciphers 63 4.5 Data Encryption Standard (DES) 67 4.6 Summary 76 5 More on Cryptographic Techniques 77 5.1 Advanced Encryption Standard 77 5.2 Block Cipher Modes of Operation 85 5.3 Public Key Infrastructure 92 5.4 The RSA Algorithm 95 5.5 Diffie–Hellman (D–H) Key Exchange 97 5.6 Summary 99 6 Message Authentication, Digital Signature, and Key Management 101 6.1 Message Authentication 101 6.2 MAC and Hash Algorithms 105 6.3 Digital Signature and Authentication 114 6.4 Key Management 122 6.5 Summary 128 Part III Security for Wireless Local Area Networks 129 7 WLAN Security 131 7.1 Introduction to WLAN 131 7.2 Evolution of WLAN Security 133 7.3 Wired Equivalent Privacy 135 7.4 IEEE 802.1X Authentication Model 140 7.5 IEEE 802.11i Standard 143 7.6 Wi-Fi Protected Access 3 and Opportunistic Wireless Encryption 150 7.7 Summary 152 8 Bluetooth Security 153 8.1 Introduction to Bluetooth 153 8.2 Link Key Generation 157 8.3 Authentication, Confidentiality, and Trust and Service Levels 163 8.4 Cryptographic Functions for Security Modes 1, 2, and 3 166 8.5 Cryptographic Functions in Security Mode 4 (SSP) 173 8.6 Summary 174 9 Zigbee Security 177 9.1 Introduction to Zigbee 177 9.2 IEEE 802.15.4 Security Features 179 9.3 Zigbee Upper Layer Security 182 9.4 Security-Related MAC PIB Attributes 187 9.5 Mechanisms Used in Zigbee Security 188 9.6 Summary 191 10 RFID Security 193 10.1 Introduction to RFID 193 10.2 Security Attacks, Risks, and Objectives of RFID Systems 195 10.3 Mitigation Strategies and Countermeasures for RFID Security Risks 196 10.4 RFID Security Mechanisms 199 10.5 Summary 205 Part IV Security for Wireless Wide Area Networks 207 11 GSM Security 209 11.1 GSM System Architecture 209 11.2 GSM Network Access Security Features 212 11.3 GSM Security Algorithms 215 11.4 Attacks Against GSM Security 225 11.5 Possible GSM Security Improvements 227 11.6 Summary 228 12 UMTS Security 229 12.1 UMTS System Architecture 229 12.2 UMTS Security Features 231 12.3 UMTS Network Access Security 232 12.4 Algorithms in Access Security 240 12.5 Other UMTS Security Features 249 12.6 Summary 250 13 LTE Security 251 13.1 LTE System Architecture 251 13.2 LTE Security Architecture 253 13.3 LTE Security 255 13.4 Handover Between eNBs 261 13.5 Security Algorithms 268 13.6 Security for Interworking Between LTE and Legacy Systems 273 13.7 Summary 278 Part V Security for Next Generation Wireless Networks 279 14 Security in 5G Wireless Networks 281 14.1 Introduction to 5G Wireless Network Systems 281 14.2 5G Security Requirements and Major Drives 283 14.3 A 5G Wireless Security Architecture 287 14.4 5G Wireless Security Services 289 14.5 5G Key Management 300 14.6 Security for New Communication Techniques in 5G 303 14.7 Challenges and Future Directions for 5G Wireless Security 308 14.8 Summary 310 15 Security in V2X Communications 311 15.1 Introduction to V2X Communications 311 15.2 Security Requirements and Possible Attacks in V2X Communications 314 15.3 IEEE WAVE Security Services for Applications and Management Messages 316 15.4 Security in Cellular Based V2X Communications 320 15.5 Cryptography and Privacy Preservation in V2X Communications 323 15.6 Challenges and Future Research Directions 329 15.7 Summary 331 References 333 Index 345
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)

Includes bibliographical references and index.

Table of Contents
Preface xvii

Acknowledgments xxiii

About the Companion Website xxv

Part I Introduction and Mathematics Background 1

1 Introduction 3

1.1 General Computer Communication Network Architecture 3

1.2 Different Types of Wireless Communication Systems 5

1.3 Network Security and Wireless Security 9

1.4 Summary 11

2 Basic Network Security Concepts 13

2.1 Security Attacks 13

2.2 Security Services 16

2.3 Security Mechanisms 21

2.4 Other Security Concepts 24

2.5 Summary 25

3 Mathematical Background 27

3.1 Basic Concepts in Modern Algebra and Number Theory 27

3.2 Prime Numbers, Modular Arithmetic, and Divisors 30

3.3 Finite Field and Galois Field 34

3.4 Polynomial Arithmetic 35

3.5 Fermat’s Little Theorem, Euler’s Totient Function, and Euler’s Theorem 41

3.6 Primality Testing 44

3.7 Chinese Remainder Theorem 46

3.8 Discrete Logarithm 48

3.9 Summary 49

Part II Cryptographic Systems 51

4 Cryptographic Techniques 53

4.1 Symmetric Encryption 53

4.2 Classical Cryptographic Schemes 53

4.3 Stream Cipher 62

4.4 Modern Block Ciphers 63

4.5 Data Encryption Standard (DES) 67

4.6 Summary 76

5 More on Cryptographic Techniques 77

5.1 Advanced Encryption Standard 77

5.2 Block Cipher Modes of Operation 85

5.3 Public Key Infrastructure 92

5.4 The RSA Algorithm 95

5.5 Diffie–Hellman (D–H) Key Exchange 97

5.6 Summary 99

6 Message Authentication, Digital Signature, and Key Management 101

6.1 Message Authentication 101

6.2 MAC and Hash Algorithms 105

6.3 Digital Signature and Authentication 114

6.4 Key Management 122

6.5 Summary 128

Part III Security for Wireless Local Area Networks 129

7 WLAN Security 131

7.1 Introduction to WLAN 131

7.2 Evolution of WLAN Security 133

7.3 Wired Equivalent Privacy 135

7.4 IEEE 802.1X Authentication Model 140

7.5 IEEE 802.11i Standard 143

7.6 Wi-Fi Protected Access 3 and Opportunistic Wireless Encryption 150

7.7 Summary 152

8 Bluetooth Security 153

8.1 Introduction to Bluetooth 153

8.2 Link Key Generation 157

8.3 Authentication, Confidentiality, and Trust and Service Levels 163

8.4 Cryptographic Functions for Security Modes 1, 2, and 3 166

8.5 Cryptographic Functions in Security Mode 4 (SSP) 173

8.6 Summary 174

9 Zigbee Security 177

9.1 Introduction to Zigbee 177

9.2 IEEE 802.15.4 Security Features 179

9.3 Zigbee Upper Layer Security 182

9.4 Security-Related MAC PIB Attributes 187

9.5 Mechanisms Used in Zigbee Security 188

9.6 Summary 191

10 RFID Security 193

10.1 Introduction to RFID 193

10.2 Security Attacks, Risks, and Objectives of RFID Systems 195

10.3 Mitigation Strategies and Countermeasures for RFID Security Risks 196

10.4 RFID Security Mechanisms 199

10.5 Summary 205

Part IV Security for Wireless Wide Area Networks 207

11 GSM Security 209

11.1 GSM System Architecture 209

11.2 GSM Network Access Security Features 212

11.3 GSM Security Algorithms 215

11.4 Attacks Against GSM Security 225

11.5 Possible GSM Security Improvements 227

11.6 Summary 228

12 UMTS Security 229

12.1 UMTS System Architecture 229

12.2 UMTS Security Features 231

12.3 UMTS Network Access Security 232

12.4 Algorithms in Access Security 240

12.5 Other UMTS Security Features 249

12.6 Summary 250

13 LTE Security 251

13.1 LTE System Architecture 251

13.2 LTE Security Architecture 253

13.3 LTE Security 255

13.4 Handover Between eNBs 261

13.5 Security Algorithms 268

13.6 Security for Interworking Between LTE and Legacy Systems 273

13.7 Summary 278

Part V Security for Next Generation Wireless Networks 279

14 Security in 5G Wireless Networks 281

14.1 Introduction to 5G Wireless Network Systems 281

14.2 5G Security Requirements and Major Drives 283

14.3 A 5G Wireless Security Architecture 287

14.4 5G Wireless Security Services 289

14.5 5G Key Management 300

14.6 Security for New Communication Techniques in 5G 303

14.7 Challenges and Future Directions for 5G Wireless Security 308

14.8 Summary 310

15 Security in V2X Communications 311

15.1 Introduction to V2X Communications 311

15.2 Security Requirements and Possible Attacks in V2X Communications 314

15.3 IEEE WAVE Security Services for Applications and Management Messages 316

15.4 Security in Cellular Based V2X Communications 320

15.5 Cryptography and Privacy Preservation in V2X Communications 323

15.6 Challenges and Future Research Directions 329

15.7 Summary 331

References 333

Index 345

About the Author
Yi Qian, PhD, is a Professor in the Department of Electrical and Computer Engineering at the University of Nebraska-Lincoln, USA. He is a recipient of the Henry Y. Kleinkauf Family Distinguished New Faculty Teaching Award in 2011, the Holling Family Distinguished Teaching Award in 2012, the Holling Family Distinguished Teaching/Advising/Mentoring Award in 2018, and the Holling Family Distinguished Teaching Award for Innovative Use of Instructional Technology in 2018, all from University of Nebraska-Lincoln, USA.

Feng Ye, PhD, is an Assistant Professor in the Department of Electrical and Computer Engineering at the University of Dayton, USA. He received his PhD from the University of Nebraska-Lincoln, USA, in 2015. He is the author or co-author over 60 technical papers.

Hsiao-Hwa Chen, PhD, is Distinguished Professor in the Department of Engineering Science at the National Cheng Kung University in Taiwan. He received his PhD from the University of Oulu, Finland, in 1991. He is the author or co-author of over 400 technical papers.

There are no comments for this item.

to post a comment.