Wireless Network Security: Communication Technology
Xuemin Shen, Ding-Zhu Du, Yang Ziao
Language: English
Pages: 420
ISBN: 2:00183691
Format: PDF / Kindle (mobi) / ePub
This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.
Linux Server Hacks, Volume 2: Tips & Tools for Connecting, Monitoring, and Troubleshooting
Raspberry Pi Hacks: Tips & Tools for Making Things with the Inexpensive Linux Computer
Managing Infrastructure with Puppet
which may occur with deployment problems. Second it does not rely on any specific data stream or client conditions. On the contrary, it is designed to cope with any applications and client environments as long as one has the proper protocol adaptor. Protocol adaptation There are some research work about the protocol adaptation. In network level systems such as [6], in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use
CONTENTS Preface Yang Xiao, Xuemin Shen, and Ding-Zhu Du vii Part I: Security in General Wireless/Mobile Networks 1 Chapter 1: High Performance Elliptic Curve Cryptographic Co-processor Jonathan Lutz and M. Anwarul Hasan 3 Chapter 2: An Adaptive Encryption Protocol in Mobile Computing Hanping Lufei and Weisong Shi 43 Part II: Security in Ad Hoc Network 63 Chapter 3: Pre-Authentication and Authentication Models in Ad Hoc Networks Katrin Hoeper and Guang Gong 65 Chapter 4: Promoting
initialization phase, represent the CA. The special role of the server nodes contradicts with the property of similar constrained devices as stated in our design goals. An example of a protocol that has been proposed in this model is [27]. In the distributed CA model without special nodes, any t network node represent the CA and can thus issue certificates. Protocols that have been proposed in this model are [16, 19]. PAM-A5. Trusted Path Model The trusted path model emphasizes the
completes the handshake to fully open the connection. For two nodes to communicate using TCP, they must first establish a TCP connection using a three-way handshake. The three messages exchanged during the handshake, illustrated in Figure 3, allow both nodes to learn that the other is ready to communicate and to agree on initial sequence numbers for the conversation. During the attack, a malicious node sends a large amount of SYN packets to a victim node, spoofing the return addresses of the SYN
is V = {a, b, c, d, e, f, g, h, i, j}, and the edge set is E = {(a, b), (a, c), ...(h, i)}. There may exist other ways to model the networks in order to facilitate the intrusion detection tasks. For example, considering the fact that a mobile user usually drives along a road, cell-based models may not precisely locate a mobile user or model the trajectory of a user because they do not support fine granularity of the road network [39]. Usually, each user will follow a specific road for daily