Handbook of Research on Wireless Security (2 Volumes)

Handbook of Research on Wireless Security (2 Volumes)

Yan Zhang (Simula Research Laboratory, Norway), Jun Zheng (City University of New York, USA) and Miao Ma (National Institute of Information & Communications Tech, Singapore)
Release Date: March, 2008|Copyright: © 2008 |Pages: 860|DOI: 10.4018/978-1-59904-899-4
ISBN13: 9781599048994|ISBN10: 159904899X|EISBN13: 9781599049007

Description

Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to society.

The Handbook of Research on Wireless Security combines research from over 100 esteemed experts from 23 countries on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security. As an innovative and current reference source for students, educators, faculty members, researchers, engineers in the field of wireless security, this handbook will make an invaluable addition to any library collection.

Topics Covered

The many academic areas covered in this publication include, but are not limited to:

  • Countermeasures
  • Data Security
  • Future of wireless security
  • Global security implications
  • Identity and privacy confidentiality
  • Information integrity
  • Information Privacy
  • Intellectual Property
  • Mobile communication systems
  • Monitoring Systems
  • Risk Management
  • Security and privacy requirements
  • Tools, techniques, methods, and frameworks
  • User management

Reviews and Testimonials

The Handbook of Research on Computer-Enhanced Language Acquisition and Learning covers the full spectrum of research in this area at its best. Useful in the classroom, useful in research; a one-stop source of information on contemporary research in computer enhanced language acquisition and learning around the globe. It is a volume I am proud to have on my bookshelves.

– Kirk Sullivan, Umea University, Sweden

This set will likely prove to be a useful resource for professionals and students involved in various aspects of technology.

– American Reference Books Annual (2008)

The material is comprehensive in its discussion and provides a useful starting point for the myriad of issues of the field.

– Book News Inc. (September 2008)

This two-part handbook on wireless security is a timely and valuable resource. This set will likely prove to be useful resource for professionals and students involved in various aspects of technology.

– American Reference Books Annual, Vol. 40 (2009)

Table of Contents and List of Contributors

Search this Book:
Reset

Preface

Wireless networks have been seen unprecedented growth in the past few years. Wireless technologies provide users with a variety of benefits like portability, flexibility, increased productivity, and lower installation costs. Various wireless technologies, from wireless local area network (WLAN) and Bluetooth to WiMAX and third generation (3G) have been developed. Each of these technologies has its own unique applications and characteristics. For example, a WLAN can provide the wireless users with high bandwidth data communication in a restricted and dense area (hotpot). Ad hoc networks, like those enabled by Bluetooth, allow data synchronization with network systems and application sharing between devices. WiMAX can provide high-speed, high bandwidth efficiency, and high-capacity multimedia services for residential as well as enterprise applications.

However, any wireless technology is inherently risky. It has the same risks as the wired networks as well as new risks brought by the wireless connectivity. There have been many reports of security weaknesses and problems related to different wireless technologies, which make wireless security quite a hot research topic recently, both in the academia and industry.

Wireless security is a very broad area as there are so many different wireless technologies existing. Each wireless technology has its own architecture, algorithms, and protocols. Different wireless technologies have their own application areas and different security concerns, requirements, and solutions. To this end, we want to bring up the Handbook of Research on Wireless Security to serve as a single comprehensive reference in the field of wireless security.

In this book, the basic concepts, terms, protocols, systems, architectures, and case studies in the wireless security are provided. It identifies the fundamental problems, key challenges, and future directions in designing secure wireless systems. It covers a wide spectrum of topics in a variety of wireless networks, including attacks, secure routing, encryption, decryption, confidentiality, integrity, key management, identity management, and also security protocols in standards.

The chapters of this book are authoritatively contributed by a group of internationally renowned experts on wireless security. They are organized in four sections:

  • Section I: Security Fundamentals
  • Section II: Security in 3G/B3G/4G
  • Section III: Security in Ad Hoc and Sensor Networks
  • Section IV: Security in Wireless PAN/LAN/MAN

    Section I introduces the basic concepts and fundamental mechanisms of wireless security. This section is able to provide the necessary background for readers and introduce all the fundamental issues on wireless security without previous knowledge on this area. Section II discusses all the security aspects in 3G/B3G/4G. It is well known that 3G mobile systems offer mobile users content rich services, wireless broadband access to Internet, and worldwide roaming. Future 4G mobile communication networks are expected to provide all IP-based services for heterogeneous wireless access technologies, assisted by mobile IP to provide seamless Internet access for mobile users. However the broadcast nature of the wireless communication and increased popularity of wireless devices introduce serious security vulnerabilities. A variety of security issues regarding 3G/B3g/4G will be introduced and addressed with effective solutions (e.g., identity management, confidentiality and integrity mechanisms, evaluation of the current 3G/B3G/4G security protocols, analysis of the impact of security deployment upon the network performance, etc.). Section III explores the security in ad hoc and sensor networks. In recent years, tremendous technological advances have been made in the areas of wireless ad hoc and sensor networks. Such networks have a significant impact on a variety of applications including scientific, military, medical, industrial, office, home, and personal domains. However, these networks introduce new security challenges due to their dynamic topology, severe resource constraints, and absence of a trusted infrastructure. Many aspects of security issues regarding the ad hoc and sensor networks will be covered, including key management, cryptographic protocols, authentication and access control, intrusion detection and tolerance, secure location services, privacy and anonymity, secure routing, resilience against different types of attacks, and so forth. Section IV exploits the security problems in wireless PAN/LAN/MAN. Nowadays we have continuously growing markets for the wireless PANs, wireless LANs, and wireless MANs, but there is a big black hole in the security of this kind of network. Diverse aspects of the security issues on these types of networks will be introduced. For instance, the threats and vulnerabilities in wireless LANs, access control in wireless LANs, evaluating security mechanisms in wireless PANs, the protocols and mechanisms to enhance the security of wireless LANs/MANs, security issues in WiMAX, and so forth are discussed. Practical examples will also be introduced to enhance the understanding.

    This book can serve as an essential and useful reference for undergraduate and graduate students, educators, scientists, researchers, engineers, and research strategists in the field of wireless security.

    We hope that by reading this book the reader can not only learn the basic concepts of wireless security but also get a good insight into some of the key research works in securing the wireless networks. Our goal is to provide an informed and detailed snapshot of this fast moving field. If you have any feedback or suggestion, please contact the editors.

    Author(s)/Editor(s) Biography

    Yan Zhang is an associate professor in the School of Computing and Information Technology, University of Western Sydney. He received his PhD degree from the University of Sydney, Australia in 1994. Yan has research interests in knowledge update, program modification and evolution, logic programming, model checking, descriptive complexity theory, and information security. Yan has published many research papers in top international conferences and journals in his areas and obtained various national competitive research grants. Currently Yan is leading a research group Intelligent Systems Laboratory (ISL) at the University of Western Sydney.
    Jun Zheng received the B.S and M.S degrees in Electrical Engineering from Chongqing University, China, in 1993, 1996, respectively, the M.S.E degree in Biomedical Engineering from Wright State University, Dayton, Ohio, in 2001, and the Ph.D. degree in Computer Engineering from University of Nevada, Las Vegas in 2005. Currently he is an assistant professor in the Department of Computer Science at Queens College of The City University of New York. He is also a member of the faculty of the Doctoral Program in Computer Science at the Graduate School and University Center of The City University of New York. He is the co-editor for two books: Security in Wireless Mesh Networks and Handbook of Research on Wireless Security. He served as general co-chair for WAMSNet-07, track co-chair for ITNG 2007, session co-organizer for PDCS 2006. He also served as TPC member for several international conferences. His research interests are mobility and resource management in wireless and mobile networks, media access control, performance evaluation, network security, computer architectures, fault-tolerant computing, and image processing. He is member of IEEE.
    Miao Ma received the B.Eng. and M.Eng. degrees in Electrical Engineering from Harbin Institute of Technology, China, respectively, and the Ph.D degree in Electrical and Electronic Engineering from Nanyang Technological University (NTU), Singapore. From August 2002 to December 2006, she has been working at the Institute for Infocomm Research (I2R), Singapore. Since Jan. 2007, she is working at the Hong Kong University of Science and Technology (HKUST). She is a member of IEEE. Her research interests include media access control, cognitive radio, security, wireless communications and networking.

    Indices

    Editorial Board

  • Hsiao-Hwa Chen, National Sun Yat-Sen University, Taiwan
  • Soong Boon Hee, Nanyang Technological University, Singapore
  • Ibrahim Habib, City University of New York, USA
  • Javier Barria, Imperial College, UK
  • Robert Deng Huijie, Singapore Management University, Singapore
  • Jie Wu, Florida Atlantic University, USA
  • Mieso Denko, University of Guelph, Canada
  • Laurence T. Yang, St. Francis Xavier University, Canada
  • Shahram Latifi, University of Nevada, USA
  • Paolo Bellavista, DEIS - Università degli Studi di Bologna, Italy
  • Ismail Khalil Ibrahim, Johannes Kepler University Linz, Austria