Security in Wireless Communication Networks
Security in Wireless Communication Networks
Click to enlarge
Author(s): Chen, Hsiao-Hwa
Qian, Yi
Ye, Feng
ISBN No.: 9781119244400
Pages: 384
Year: 202111
Format: E-Book
Price: $ 179.33
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Preface xvii Acknowledgments xxiii About the Companion Website xxv Part I Introduction and Mathematics Background 1 1 Introduction 3 1.1 General Computer Communication Network Architecture 3 1.1.1 Wired Communication Network Infrastructure 3 1.1.2 Wireless Communication Network Infrastructure 4 1.2 Different Types of Wireless Communication Systems 5 1.2.


1 Classification of Wireless Communication Systems 5 1.2.1.1 Based on Coverage 5 1.2.1.2 Based on Topology 6 1.2.


1.3 Based on Mobility 6 1.2.2 Wireless Personal Area Networks 7 1.2.3 Wireless Local Area Networks 7 1.2.4 Wireless Wide Area Networks 7 1.


3 Network Security and Wireless Security 9 1.3.1 Network Security 9 1.3.2 Security Threats in Wireless Networks 10 1.4 Summary 11 2 Basic Network Security Concepts 13 2.1 Security Attacks 13 2.1.


1 Passive Attacks 13 2.1.1.1 Eavesdropping 13 2.1.1.2 Traffic Analysis 14 2.1.


2 Active Attacks 15 2.2 Security Services 16 2.2.1 Access Control 17 2.2.2 Authentication 17 2.2.3 Confidentiality 18 2.


2.4 Integrity 18 2.2.5 Non-repudiation 19 2.2.6 Availability 19 2.3 Security Mechanisms 21 2.3.


1 Encipherment 21 2.3.2 Authentication 21 2.3.3 Access Control 22 2.3.4 Digital Signature 22 2.3.


5 Data Integrity 23 2.3.6 Traffic Padding and Routing Control 23 2.3.7 Notarization 24 2.4 Other Security Concepts 24 2.4.1 Levels of Impact 24 2.


4.2 Cryptographic Protocols 25 2.5 Summary 25 3 Mathematical Background 27 3.1 Basic Concepts in Modern Algebra and Number Theory 27 3.1.1 Group 27 3.1.1.


1 Abelian Group 28 3.1.1.2 Cyclic Group 28 3.1.2 Ring 29 3.1.3 Field 29 3.


2 Prime Numbers, Modular Arithmetic, and Divisors 30 3.2.1 Prime Numbers 30 3.2.2 Modular Arithmetic 30 3.2.3 Divisors and GCD 31 3.2.


4 Multiplicative Inverse 33 3.3 Finite Field and Galois Field 34 3.4 Polynomial Arithmetic 35 3.4.1 Ordinary Polynomial Arithmetic 35 3.4.2 Polynomial Arithmetic in Finite Fields 36 3.4.


3 Modular Polynomial Arithmetic 37 3.4.4 Computational Considerations 39 3.4.5 Generating a Finite Field with a Generator 40 3.5 Fermat''s Little Theorem, Euler''s Totient Function, and Euler''s Theorem 41 3.5.1 Fermat''s Little Theorem 41 3.


5.2 Euler Totient Function ( n ) 42 3.5.3 Euler''s Theorem 43 3.6 Primality Testing 44 3.7 Chinese Remainder Theorem 46 3.8 Discrete Logarithm 48 3.9 Summary 49 Part II Cryptographic Systems 51 4 Cryptographic Techniques 53 4.


1 Symmetric Encryption 53 4.2 Classical Cryptographic Schemes 53 4.2.1 Classical Substitution Ciphers 54 4.2.1.1 Caesar Cipher 54 4.2.


1.2 Monoalphabetic Cipher 55 4.2.1.3 Playfair Cipher 57 4.2.1.4 Polyalphabetic Cipher 58 4.


2.1.5 Autokey Cipher 59 4.2.1.6 One-Time Pad 60 4.2.2 Classical Transposition Ciphers 60 4.


2.2.1 Rail Fence Cipher 60 4.2.2.2 Row Transposition Cipher 60 4.2.2.


3 Product Cipher 61 4.2.3 More Advanced Classical Ciphers 61 4.2.3.1 Rotor Machines 61 4.2.3.


2 Steganography 61 4.3 Stream Cipher 62 4.3.1 Rivest Cipher 4 62 4.4 Modern Block Ciphers 63 4.4.1 Overview of Modern Block Ciphers 63 4.4.


2 Feistel Block Cipher 64 4.4.2.1 Ideal Block Cipher 64 4.4.2.2 Feistel Cipher Structure 65 4.4.


3 Block Cipher Design 67 4.5 Data Encryption Standards (DES) 67 4.5.1 Overview of DES 67 4.5.2 Initial Permutation (IP) 68 4.5.3 DES Round Function 69 4.


5.3.1 DES S-Boxes 71 4.5.3.2 DES Permutation Function 72 4.5.4 DES Key Schedule 72 4.


5.5 DES Security 74 4.5.6 Multiple Encryption and DES 75 4.6 Summary 76 5 More on Cryptographic Techniques 77 5.1 Advanced Encryption Standards 77 5.1.1 The AES Cipher: Rijndael 77 5.


1.2 AES Data Structure 77 5.1.3 Details in Each Round 79 5.1.3.1 Substitute Bytes 79 5.1.


3.2 Shift Rows 81 5.1.3.3 Mix Columns 81 5.1.3.4 Add Round Key 82 5.


1.3.5 AES Key Expansion 82 5.1.3.6 AES Decryption 84 5.1.3.


7 AES Implementation Aspects 84 5.2 Block Cipher Modes of Operation 85 5.2.1 Electronic Codebook (ECB) Mode 85 5.2.2 Cipher Block Chaining (CBC) Mode 86 5.2.3 Cipher Feedback (CFB) Mode 87 5.


2.4 Output Feedback (OFB) Mode 88 5.2.5 The Counter (CTR) Mode 89 5.2.6 Last Block in Different Modes 90 5.2.7 XTS-AES Mode 90 5.


3 Public Key Infrastructure 92 5.3.1 Basics of Public Key Cryptography 92 5.3.2 Public-Key Applications 94 5.3.3 Security of Public Key Schemes 94 5.4 The RSA Algorithm 95 5.


4.1 RSA Key Setup 95 5.4.2 RSA Encryption and Decryption 96 5.4.3 RSA Security Analysis 96 5.4.3.


1 Factoring Problem 97 5.4.3.2 Timing attacks 97 5.4.3.3 Chosen Ciphertext Attacks 97 5.5 Diffie-Hellman (D-H) Key Exchange 97 5.


5.1 Finite-Field Diffie-Hellman 97 5.5.2 Elliptic-Curve Diffie-Hellman 98 5.5.3 Diffie-Hellman Key Exchange Vulnerability 98 5.6 Summary 99 6 Message Authentication, Digital Signature, and Key Management 101 6.1 Message Authentication 101 6.


1.1 Message Authentication Functions 101 6.1.2 Message Authentication Code 102 6.1.3 Hash Functions 103 6.1.4 Size of MAC and Hash Value 104 6.


2 MAC and Hash Algorithms 105 6.2.1 Data Authentication Algorithm 105 6.2.2 A Basic Hash Function Structure 106 6.2.3 Secure Hash Algorithm (SHA) 106 6.2.


4 SHA-512 107 6.2.4.1 SHA-512 Compression Function 108 6.2.4.2 SHA-512 Round Function 109 6.2.


5 Whirlpool 111 6.2.6 Other MAC Functions 112 6.2.6.1 Keyed Hash Functions as MACs 112 6.2.6.


2 Cipher-Based MAC 113 6.3 Digital Signature and Authentication 114 6.3.1 Digital Signature Properties 115 6.3.2 Digital Signature Standard and Algorithm 116 6.3.3 The Elliptic Curve Digital Signature Algorithm 117 6.


3.3.1 ECDSA Domain Parameters 117 6.3.3.2 ECDSA Private/Public Keys 118 6.3.3.


3 ECDSA Digital Signature Generation 119 6.3.3.4 ECDSA Digital Signature Verification 120 6.3.4 Authentication Protocols 120 6.4 Key Management 122 6.4.


1 Key Distribution with Symmetric Key Encryptions 122 6.4.2 Symmetric Key Distribution Using Public Key Cryptosystems 123 6.4.3 Distribution of Public Keys 124 6.4.4 Public Key Infrastructure 126 6.4.


5 X.509 Authentication Service 126 6.5 Summary 128 Part III Security for Wireless Local Area Networks 129 7 WLAN Security 131 7.1 Introduction to WLAN 131 7.1.1 Wi-Fi Operating Modes 131 7.1.2 Challenges in WLAN Security 132 7.


1.3 Tricks that Fail to Protect WLAN 133 7.2 Evolution of WLAN Security 133 7.3 Wired Equivalent Privacy 135 7.3.1 WEP Access Control 135 7.3.2 WEP Integrity and Confidentiality 136 7.


3.3 WEP Key Management 136 7.3.4 WEP Security Problems 137 7.3.4.1 Problems in WEP Access Control 138 7.3.


4.2 Problems in WEP Integrity 138 7.3.4.3 Problems in WEP Confidentiality 138 7.3.4.4 Problems in WEP Key Management 139 7.


3.5 Possible WEP Security Enhancement 140 7.4 IEEE 802.1X Authentication Model 140 7.4.1 An Overview of IEEE 802.1X 140 7.4.


2 Protocols in IEEE 802.1X 141 7.4.3 Mapping the IEEE 802.1X model to WLAN 143 7.5 IEEE 802.11i Standard 143 7.5.


1 Overview of IEEE 802.11i 143 7.5.2 IEEE 802.11i Access Control 143 7.5.3 IEEE 802.1i Key Management 145 7.


5.4 IEEE 802.11i Integrity and Confidentiality 147 7.5.4.1 TKIP Mode 147 7.5.4.


2 AES-CCMP Mode 148 7.5.5 Function Michael 148 7.5.6 Weakness in 802.11i 150 7.6 Wi-Fi Protected Access 3 and Opportunistic Wireless Encryption 150 7.6.


1 WPA3-Personal 150 7.6.2 WPA3-Enterprise 150 7.6.3 Opportunistic Wireless Encryption 151 7.7 Summary 152 8 Bluetooth Security 153 8.1 Introduction to Bluetooth 153 8.1.


1 Overview of Bluetooth Technology 153 8.1.2 Bluetooth Vulnerabilities and Threats 154 8.1.2.1 Bluesnarfing 155 8.1.2.


2 Bluejacking 155 8.1.2.3 Bluebugging 155 8.1.2.4 Car Whisperer 155 8.1.


2.5 Fuzzing Attacks 155 8.1.3 Bluetooth Security Services and Security Modes 156 8.1.3.1 Bluetooth Security Services 156 8.1.


3.2 Bluetooth Security Modes 156 8.2 Link Key Generation 157 8.2.1 Link Key Generation for Security Modes 2 and 3 157 8.2.2 Link Key Generation for Security Mode 4 158 8.2.


3 Association Model in Mode 4 159 8.2.3.1 Numeric comparison 159 8.2.3.2 Out-of-Band (OOB) 160 8.2.


3.3 Passkey entry 162 8.3 Authentication, Confidentiality, and Trust and Service Levels 163 8.3.1 Authentication 163 8.3.2 Confidentiality 164 8.3.


3 Trust and Security Service Levels 165 8.4 Cryptographic Functions for Security Modes 1, 2, and 3 166 8.4.1 SAFER+ 166 8.4.1.1 Overview of the SAFER+ Structure 166 8.4.


1.2 SAFER+ Round Function 166 8.4.1.3 SAFER+ Key Schedule.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...