Wireless Network Security-Theories and Applications

无线网络安全-理论与应用

Price: $24.00


Qty. 
+-

Author: Chen Lei
Language: English
ISBN/ISSN: 9787040366808
Published on: 2013-05
Soft Cover

Chapter 1 Applications, Technologies, and Standards in Secure Wireless Networks and Communications Lei Chen 1.1 Introduction 1.2 Overview of Security in Cellular Networks and Communications 1.3 Overview of Security in WLANs 1.4 Overview of Security in WMANs 1.5 Overview of Security in Bluetooth Networks and Communications 1.6 Overview of Security in VANETs 1.7 Overview of Security in WSNs 1.8 Overview of Security in WMNs 1.9 Overview of Security in RFID Networks and Communications 1.10 Summary ReferencesChapter 2 Security in Cellular Networks and Communications Chuan-Kun Wu 2.1 Introduction 2.2 Security architecture of cellular communication networks 2.3 Security techniques in GSM networks 2.4 Security techniques in 3G networks 2.5 Security techniques in LTE networks 2.6 Security issues in femtocell 2.7 Privacy issues in cellular networks 2.8 Security issues of mobile devices 2.9 Concluding remarks ReferencesChapter 3 Security in Wireless Local Area Networks Chao Yang and Guofei Gu 3.1 Introduction to WLAN 3.2 Current State of WLAN Security 3.3 WLAN Communication Security 3.4 WLAN Access Point Security 3.5 Other WLAN Security Issues 3.6 Conclusion ReferencesChapter 4 Security in Wireless Metropolitan Area Networks Lei Chen, Narasimha Shashidhar, Shengli Yuan, and Ming Yang 4.1 Introduction 4.2 Fundamentals of WiMAX 4.3 WiMAX security goals and solutions 4.4 WiMAX security vulnerabilities, threats, and countermeasures 4.5 Summary ReferencesChapter 5 Security in Bluetooth Networks and Communications Lei Chen, Peter Cooper, and Qingzhong Liu 5.1 Introduction 5.2 Bluetooth Primer 5.3 Bluetooth Security Solutions 5.4 Bluetooth Security Vulnerabilities, Threats, and Countermeasures 5.5 Conclusion ReferencesChapter 6 Security in Vehicular Ad Hoc Networks (VANETs) Weidong Yang 6.1 Introduction 6.2 Security Architecture Framework for Vehicular Ad Hoc Networks 6.3 Secure Communication protocols for Vehicular Ad Hoc Network 6.4 Privacy Enhancing and Secure Positioning 6.5 Conclusion ReferencesChapter 7 Security in Wireless Sensor Networks Weiping Wang, Shigeng Zhang, Guihua Duan, and Hong Song 7.1 Introduction 7.2 Key management in WSNs 7.3 Secure routing protocols in WSNs 7.4 Location privacy protections in WSNs 7.5 Secure data aggregation 7.6 Conclusion ReferencesChapter 8 Security in Wireless Sensor Networks Ping Li, Limin Sun, Xiangyan Fu, and Lin Ning 8.1 Introduction 8.2 Overview of security architecture for WSN 8.3 Cryptographic Approaches 8.4 Resilience on Key Management 8.5 Trust Management 8.6 Location Privacy 8.7 Conclusion ReferencesChapter 9 Security in Wireless Mesh Networks Chung-wei Lee 9.1 Introduction 9.2 Wireless Mesh Networks (WMN) Characteristics 9.3 WMN Security Vulnerabilities 9.4 WMN Defense Mechanisms 9.5 WMN Security Standards and Products 9.6 Conclusion ReferencesChapter 10 Security in RFID Networks and Communications Chiu C. Tan and Jie Wu 10.1 Introduction 10.2 RFID Network Primer 10.3 Security Requirements 10.4 Hardware Based Solutions 10.5 Basic Protocol Based Solutions 10.6 Advance Protocol Based Solutions 10.7 Commercial RFID Security 10.8 Conclusion ReferencesIndex



Sorry we ran out!

Fill out this form and we will let you know when it comes back in stock

Copyright © 2022 China Scientific Books