This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This material will be of invaluable use to all those working in the network security field, and especially to the many people entering the field. The next area of focus is on the security issues and available solutions associated with off-the-shelf wireless and mobile technologies such as Bluetooth, WiFi, WiMax, 2G, and 3G. There is coverage of the security techniques used to protect applications downloaded by mobile terminals through mobile cellular networks, and finally the book addresses security issues and solutions in emerging wireless and mobile technologies such as ad hoc and sensor networks, cellular 4G and IMS networks.



Autorentext

Hakima Chaouchi is an Assistant Professor at the French National Institute of Telecommunications (INT).

Maryline Laurent-Maknavicius is Professor at the French National Institute of Telecommunications (INT) and is the head of the VIS research security team.

Inhalt

Introduction. xvii

PART 1. Basic Concepts 1

Chapter 1. Introduction to Mobile and Wireless Networks 3
Hakima CHAOUCHI and Tara ALI YAHIYA

1.1. Introduction 3

1.2. Mobile cellular networks 4

1.3. IEEE wireless networks 13

1.4. Mobile Internet networks 32

1.5. Current trends 42

1.6. Conclusions 44

1.7. Bibliography 45

Chapter 2. Vulnerabilities of Wired and Wireless Networks 47
Artur HECKER

2.1. Introduction 47

2.2. Security in the digital age 48

2.3. Threats and risks to telecommunications systems 55

2.4. From wireline vulnerabilities to vulnerabilities in wireless communications 67

2.5. Conclusions 70

2.6. Bibliography 71

Chapter 3. Fundamental Security Mechanisms 73
Maryline LAURENT-MAKNAVICIUS, Hakima CHAOUCHI and Olivier PAUL

3.1. Introduction 73

3.2. Basics on security 73

3.3. Secure communication protocols and VPN implementation 88

3.4. Authentication 105

3.5. Access control 118

3.6. Conclusions126

3.7. Bibliography 126

Chapter 4. Wi-Fi Security Dedicated Architectures 131
Franck VEYSSET, Laurent BUTTI and Jerôme RAZNIEWSKI

4.1. Introduction 131

4.2. Hot spot architecture: captive portals131

4.3. Wireless intrusion detection systems (WIDS) 137

4.4. Wireless honeypots 145

Chapter 5. Multimedia Content Watermarking 149
Mihai MITREA and Françoise PRÊTEUX

5.1. Introduction 149

5.2. Robust watermarking: a new challenge for the information society 150

5.3. Different constraints for different types of media 157

5.4. Toward the watermarking theoretical model 172

5.5. Discussion and perspectives 188

5.6. Conclusion 195

5.7. Bibliography 196

PART 2. Off-the Shelf Technologies 203

Chapter 6. Bluetooth Security 205
Franck GILLET

6.1. Introduction 205

6.2. Bluetooth technical specification 207

6.3. Bluetooth security 220

6.4. Conclusion 228

6.5. Bibliography 229

Chapter 7. Wi-Fi Security 231
Guy PUJOLLE

7.1. Introduction 231

7.2. Attacks on wireless networks 232

7.3. Security in the IEEE 802.11 standard 235

7.4. Security in 802.1x 245

7.5. Security in 802.11i 249

7.6. Authentication in wireless networks 258

7.7. Layer 3 security mechanisms 263

7.8. Bibliography 270

Chapter 8. WiMAX Security 271
Pascal URIEN, translated by Léa URIEN

8.1. Introduction 271

8.2. WiMAX low layers 276

8.3. Security according to 802.16-2004 283

8.4. Security according to the IEEE-802.16e standard 293

8.5. The role of the smart card in WiMAX infrastructures 308

8.6. Conclusion 311

8.7. Glossary 311

8.8. Bibliography 313

Chapter 9. Security in Mobile Telecommunication Networks 315
Jérôme HÄRRI and Christian BONNET

9.1. Introduction 315

9.2. Signaling 317

9.3. Security in the GSM 326

9.4. GPRS security 338

9.5. 3G security 349

9.6. Network interconnection 356

9.7. Conclusion 357

9.8. Bibliography 358

Chapter 10. Security of Downloadable Applications 361
Pierre CRÉGUT, Isabelle RAVOT and Cuihtlauac ALVARADO

10.1. Introduction 361

10.2. Opening the handset 362

10.3. Security policy 363

10.4. The implementation of a security policy 368

10.5. Execution environments ...

Titel
Wireless and Mobile Network Security
EAN
9781118619544
ISBN
978-1-118-61954-4
Format
E-Book (epub)
Hersteller
Herausgeber
Veröffentlichung
01.03.2013
Digitaler Kopierschutz
Adobe-DRM
Dateigrösse
7.04 MB
Anzahl Seiten
744
Jahr
2013
Untertitel
Englisch