点此搜书

无线网络安全  理论与应用  英文版
  • 作 者:陈磊,季家凰,张自洪主编
  • 出 版 社:北京:高等教育出版社
  • 出版年份:2013
  • ISBN:9787040366808
  • 标注页数:274 页
  • PDF页数:284 页
  • 请阅读订购服务说明与试读!

文档类型

价格(积分)

购买连接

试读

PDF格式

10

立即购买

点击试读

订购服务说明

1、本站所有的书默认都是PDF格式,该格式图书只能阅读和打印,不能再次编辑。

2、除分上下册或者多册的情况下,一般PDF页数一定要大于标注页数才建议下单购买。【本资源284 ≥274页】

图书下载及付费说明

1、所有的电子图书为PDF格式,支持电脑、手机、平板等各类电子设备阅读;可以任意拷贝文件到不同的阅读设备里进行阅读。

2、电子图书在提交订单后一般半小时内处理完成,最晚48小时内处理完成。(非工作日购买会延迟)

3、所有的电子图书都是原书直接扫描方式制作而成。

Chapter 1 Applications,Technologies,and Standards in Secure Wireless NetWorks and Communications 1

Lei Chen 1

1.1 Introduction 1

1.2 Overview of Security in Cellular Networks and Communications 3

1.3 Overview of Security in WLANs 3

1.4 Overview of Security in WMANs 4

1.5 Overview of Security in Bluetooth Networks and Communications 5

1.6 Overview of Security in VANETs 5

1.7 Overview of Security in WSNs 6

1.8 Overview of Security in WMNs 6

1.9 Overview of Security in RFID Networks and Communications 7

1.10 Summary 7

References 8

Chapter 2 Security in Cellular NetWorks and Communications 9

Chuan-Kun Wu 10

2.1 Introduction 10

2.2 Security architecture of cellular communication networks 12

2.3 Security techniques in GSM networks 14

2.4 Security techniques in 3G networks 22

2.5 Security techniques in LTE networks 25

2.6 Security issues in femtocell 33

2.7 Privacy issues in cellular networks 34

2.8 Security issues of mobile devices 35

2.9 Concluding remarks 35

References 36

Chapter 3 Security in Wireless Local Area NetWorks 39

Chao Yang and Guofei Gu 39

3.1 Introduction to WLAN 39

3.2 Current State of WLAN Security 42

3.3 WLAN Communication Security 46

3.4 WLAN Access Point Security 53

3.5 Other WLAN Security Issues 55

3.6 Conclusion 56

References 56

Chapter 4 Security in Wireless Metropolitan Area NetWorks 59

Lei Chen,Narasimha Shashidhar,Shengli Yuan,and Ming Yang 60

4.1 Introduction 60

4.2 Fundamentals of WiMAX 61

4.3 WiMAX security goals and solutions 63

4.4 WiMAX security Vulnerabilities,threats,and countermeasures 72

4.5 Summary 73

References 74

Chapter 5 Security in Bluetooth NetWorks and Communications 77

Lei Chen,Peter Cooper,and Qingzhong Liu 77

5.1 Introduction 77

5.2 Bluetooth Primer 78

5.3 Bluetooth Security Solutions 82

5.4 Bluetooth Security Vulnerabilities,Threats,and Countermeasures 90

5.5 Conclusion 92

References 93

Chapter 6 Security in Vehicular Ad Hoc NetWorks(VANETs) 95

Weidong Yang 95

6.1 Introduction 95

6.2 Security Architecture Framework for Vehicular Ad Hoc Networks 101

6.3 Secure Communication protocols for Vehicular Ad Hoc Network 115

6.4 Privacy Enhancing and Secure Positioning 120

6.5 Conclusion 126

References 127

Chapter 7 Security in Wireless Sensor NetWorks 129

Weiping Wang,Shigeng Zhang.Guihua Duan,and Hong Song 129

7.1 Introduction 129

7.2 Key management in WSNs 131

7.3 Secure routing protocols in WSNs 144

7.4 Location privacy protections in WSNs 153

7.5 Secure data aggregation 161

7.6 Conclusion 172

References 172

Chapter 8 Security in Wireless Sensor NetWorks 179

Ping Li,Limin Sun,Xiangyan Fu,and Lin Ning 179

8.1 Introduction 179

8.2 Overview of security architecture for WSN 181

8.3 Cryptographic Approaches 189

8.4 Resilience on Key Management 195

8.5 Tust Management 200

8.6 Location Privacy 214

8.7 Conclusion 220

References 221

Chapter 9 Security in Wireless Mesh NetWorks 229

Chung-wei Lee 229

9.1 Introduction 229

9.2 Wireless Mesh Networks(WMN)Characteristics 231

9.3 WMN Security Vulnerabilities 234

9.4 WMN Defense Mechanisms 236

9.5 WMN Security Standards and Products 243

9.6 Conclusion 244

References 244

Chapter 10 Security in RFID Networks and Communications 247

Chiu C.Tan and Jie Wu 247

10.1 Introduction 247

10.2 RFID Network Primer 248

10.3 Security Requirements 252

10.4 Hardware Based Solutions 253

10.5 Basic Protocol Based Solutions 254

10.6 Advance Protocol Based Solutions 258

10.7 Commercial RFID Security 260

10.8 Conclusion 264

References 265

Index 269

购买PDF格式(10分)
返回顶部