Mohammad Ilyas, Syed A. Ahson9780849323232, 0-8493-2323-1
Table of contents :
Contents……Page 0
HANDBOOK OF WIRELESS LOCAL AREA NETWORKS……Page 1
CONTENTS……Page 5
ABOUT THE EDITORS……Page 8
PREFACE……Page 10
I INTRODUCTION……Page 12
INTRODUCTION……Page 13
TRAFFIC ISSUES……Page 16
MOBILITY CLASSES……Page 17
MOBILITY MANAGEMENT……Page 18
MOBILE IP……Page 19
Registration……Page 21
MoM Protocol Details……Page 22
Deficiencies in Mobile IP……Page 26
Routing……Page 27
Location Management……Page 28
Handovers……Page 29
Handover Mechanisms for Cellular Wireless Packet Networks……Page 30
ROUTING PROTOCOLS FOR IMPLEMENTING IP MOBILITY……Page 31
POTENTIAL APPLICATIONS……Page 32
REFERENCES……Page 33
INTRODUCTION……Page 35
NETWORK PERFORMANCE ISSUES……Page 36
WLAN PERFORMANCE……Page 37
TCP Congestion Control Model……Page 40
The SNR Estimate Model of 802.11g WLAN……Page 43
Performance Model of an 802.11 System with Fragmented Frames……Page 47
CONCLUSIONS……Page 51
REFERENCES……Page 59
INTRODUCTION……Page 60
WAP……Page 63
Web Services……Page 64
Viruses and Other Malware……Page 65
Operating System Security……Page 66
COMMUNICATIONS SECURITY……Page 67
IEEE 802.11 Wireless LAN Standard……Page 68
Bluetooth……Page 69
GATEWAY SERVER SECURITY……Page 70
GATEWAY SERVICES……Page 73
THE FUTURE……Page 74
REFERENCES……Page 75
INTRODUCTION……Page 78
BLUETOOTH……Page 81
Network Architecture……Page 86
802.11 Physical Layer……Page 88
IEEE 802.11 MAC Layer……Page 89
IEEE 802.11b PHY Layer Enhancements……Page 90
IEEE 802.11a……Page 92
MAC Layer……Page 93
IEEE 802.11 Extensions……Page 95
Software Architecture……Page 96
HIPERLAN/2……Page 97
Software Architecture……Page 98
REFERENCES……Page 100
INTRODUCTION……Page 102
IEEE 802.11 Overview……Page 105
WEP: Encryption……Page 107
WEP Authentication……Page 111
Inadequate Size of IV……Page 113
Poor Choice of ICV Algorithm……Page 114
Message Insertion Attacks……Page 115
RC4 Weak Keys……Page 117
Temporal Key Integrity Protocol (TKIP) and the Wi-Fi Protected Access (WPA) Interim Solution……Page 118
Keys Used in TKIP……Page 120
CCMP……Page 121
Overview of 802.1X……Page 122
Authentication Protocols……Page 123
Protocol Overview……Page 124
Security……Page 127
Link Keys……Page 128
Initialization……Page 129
Combination Key KAB……Page 130
Authentication……Page 131
Encryption……Page 132
GSM Security……Page 133
Authentication……Page 134
Security……Page 135
Encryption……Page 136
APPLICATION OF HIGHER-LEVEL SECURITY PROTOCOLS……Page 137
REFERENCES……Page 139
II TECHNOLOGY……Page 142
INTRODUCTION TO AD HOC NETWORKS……Page 143
THE APPLICATION SCENARIOS……Page 144
PECULIARITIES OF AD HOC NETWORKS……Page 146
THE PROTOCOL FRAMEWORK……Page 148
SOME RELEVANT ISSUES……Page 149
BIBLIOGRAPHY……Page 159
INTRODUCTION……Page 163
DESIGN……Page 165
EVALUATION AND ENHANCEMENTS……Page 172
RELATED WORK……Page 179
CONCLUSIONS……Page 182
REFERENCES……Page 183
INTRODUCTION……Page 184
SPACE-TIME CODING……Page 187
CODE DESIGN AND DECODING……Page 192
CHANNEL ESTIMATION……Page 198
BLAST……Page 202
REFERENCES……Page 206
INTRODUCTION……Page 208
WLAN AND 3G CELLULAR CONVERGENCE ARCHITECTURE……Page 210
Mobility Management and Seamless Handoff……Page 219
Other Interworking Issues……Page 225
STANDARDIZATION ACTIVITIES……Page 227
3GPP Interworking Scenarios……Page 228
3GPP WLAN Subsystem……Page 229
AN ARCHITECTURE BEYOND 3G……Page 235
CONCLUSIONS……Page 236
BIBLIOGRAPHY……Page 238
III APPLICATIONS……Page 240
INTRODUCTION……Page 241
A SIMPLE MODEL FOR MOBILE APPLICATION SERVICES……Page 245
PRIVATE AND SECURE B2B SCHEDULING SERVICES……Page 249
A MTCS……Page 253
CONTENT DISTRIBUTION IN AN INTERNET WITH WLANS……Page 257
MOBILE RADIO BROADCASTING SERVICES……Page 263
CONCLUSIONS……Page 265
REFERENCES……Page 269
INTRODUCTION……Page 272
EVOLUTION AND MAIN FEATURES OF M-COMMERCE……Page 275
Ubiquity……Page 279
Technology Providers……Page 280
Network Operators……Page 283
M-COMMERCE STRATEGIC GRID FRAMEWORK……Page 284
Personal Life Management……Page 287
Mobile Access to Web Portals……Page 288
Inventory Management……Page 292
Mobile Advertisements……Page 293
Reengineered Applications……Page 294
Mobile Distance Education……Page 295
REFERENCES……Page 296
INTRODUCTION……Page 298
WLANS IN TELEMEDICINE……Page 300
SUMMARY AND CONCLUSIONS……Page 307
REFERENCES……Page 308
INTRODUCTION……Page 309
WBGM SYSTEM ARCHITECTURE……Page 314
SYSTEM DEVELOPMENT PRACTICE……Page 318
TECHNICAL ELEMENTS IN WIRELESS SECURITY……Page 323
AN APPROACH TO COMMERCIAL DEPLOYMENT……Page 329
REFERENCES……Page 338
IV SECURITY I……Page 342
SECURITY SERVICES AND ISSUES IN WIRELESS LOCAL AREA NETWORKS……Page 343
802.11 WIRELESS LOCAL AREA NETWORK……Page 344
ATTACKS AGAINST WIRELESS NETWORKS……Page 345
Denial-of-Service Attacks……Page 346
WLAN SECURITY SERVICES……Page 347
WEP……Page 351
SECURITY WEAKNESSES IN WEP……Page 353
ENHANCING WEP SECURITY: THE IEEE 802.1X STANDARD……Page 357
USING BIOMETRICS FOR ENHANCED WIRELESS AUTHENTICATION……Page 364
WI-FI PROTECTED ACCESS (WPA) AND THE IEEE 802.11i STANDARD……Page 368
REFERENCES……Page 369
INTRODUCTION……Page 371
WLANS……Page 372
IEEE 802.11……Page 374
IEEE 802.11 WLAN IN INFRASTRUCTURE MODE……Page 375
SECURITY MECHANISM……Page 376
THREATS AND ATTACKS……Page 379
FIRST-GENERATION SECURITY OF IEEE 802.11 STANDARD……Page 380
MAC ADDRESS FILTERING……Page 381
WEP……Page 382
IEEE 802.1X……Page 386
TKIP……Page 387
IEEE 802.11I……Page 388
MANAGEMENT COUNTERMEASURE……Page 392
OPERATIONAL COUNTERMEASURE……Page 393
HARDWARE COUNTERMEASURES……Page 394
REFERENCES……Page 396
MAJOR SECURITY RISKS……Page 398
MINIMIZING SECURITY RISKS……Page 400
Frame Encryption……Page 402
Key Management……Page 404
SECURITY EXTENSIONS……Page 406
IEEE 802.1X……Page 407
EAP……Page 408
TKIP: PPK……Page 413
EAP-Tunneled TLS (EAP-TTLS)……Page 415
ADVANCED ENCRYPTION STANDARD (AES)……Page 417
FILTERING……Page 418
WIRELESS NETWORK DESIGN GUIDELINES……Page 420
TIPS FOR SECURE WLAN NETWORKING……Page 422
REFERENCES……Page 423
INTRODUCTION……Page 425
TYPES OF WLANS……Page 426
THE IEEE 802.11 PROTOCOLS AND BUILT-IN SECURITY FEATURES……Page 429
WLAN VULNERABILITIES……Page 432
ALTERNATIVE SOLUTIONS FOR WLAN SECURITY……Page 435
RSN in 802.11i……Page 438
The IEEE 802.1X Protocol……Page 439
Vulnerabilities of 802.11i……Page 441
REFERENCES……Page 444
V SECURITY II……Page 447
INTRODUCTION……Page 448
ENABLING SECURITY TECHNOLOGIES AND SAMPLE APPLICATIONS……Page 449
THE NEED FOR STRONG CRYPTOGRAPHY IN WIRELESS APPLICATIONS……Page 451
FURTHER ISSUES FOR WIRELESS SECURITY……Page 452
CONCLUSIONS AND FUTURE DIRECTIONS……Page 455
REFERENCES……Page 456
INTRODUCTION……Page 457
SECURITY THREATS AND ATTACKS……Page 459
SECURITY SERVICES……Page 461
WHAT IS WEP?……Page 466
WEP IN DETAIL……Page 468
IEEE 802.1X……Page 470
WPA……Page 472
SHARED-KEY AUTHENTICATION……Page 473
CONCLUSION……Page 474
INTRODUCTION……Page 476
802.11 WEP AND RELATED CRYPTOLOGY……Page 477
A BRIEF OVERVIEW OF COMMON ATTACKS……Page 479
802.1X……Page 485
RADIUS Authentication……Page 486
802.11i Key Management……Page 488
CCMP……Page 490
WRAP……Page 491
Michael Vulnerabilities……Page 492
Composition of Authentication and Encryption……Page 493
SUMMARY……Page 494
REFERENCES……Page 495
INTRODUCTION TO WIRELESS NETWORKS……Page 497
VULNERABILITIES IN COMPUTER NETWORKS……Page 498
WIRELESS COMMUNICATION TECHNOLOGIES……Page 504
SECURITY IN WIRELESS NETWORKS……Page 509
CONCLUSIONS……Page 516
REFERENCES……Page 517
VI STANDARDS……Page 518
INTRODUCTION……Page 519
MAC PROTOCOLS……Page 520
Location-Dependent Medium Status – Hidden- and Exposed-Station Problem……Page 525
DESIGN OF MAC PROTOCOL FOR WLAN……Page 527
Binary Exponential Backoff……Page 529
Improvements over MACA……Page 530
Channel Status Measurement……Page 540
IEEE 802.11……Page 541
CFP Beacon……Page 552
Possible PCF Scenario……Page 553
SUMMARY……Page 554
REFERENCES……Page 555
INTRODUCTION……Page 557
3G STANDARDIZATION AND DEPLOYMENT……Page 558
EVOLUTION TOWARD 3G UMTS – HSCSD, GPRS, AND EDGE……Page 559
UNIVERSAL MOBILE TELECOMMUNICATIONS SERVICE ( W- CDMA)……Page 562
INTERNETWORKING WITH IEEE 802.11B……Page 570
CONCLUSION……Page 576
REFERENCES……Page 577
INTRODUCTION……Page 578
WLANS AND SECURITY STANDARDS……Page 579
WEP CHARACTERISTICS……Page 581
RC4 Keys in the WEP Protocol……Page 582
WEP Authentication Security Problems……Page 587
THE IEEE 802.11I SECURITY ARCHITECTURE……Page 590
Data Confidentiality Protection……Page 596
CONCLUSIONS……Page 597
REFERENCES……Page 599
INTRODUCTION……Page 600
MAC PROTOCOLS FOR WLANS: REINVENTING THE WHEEL?……Page 602
IEEE 802.11 WLANS INFRASTRUCTURE……Page 606
EVOLUTION OF DISTRIBUTED CONTENTION-BASED MAC: FROM ALOHA TO IEEE 802.11……Page 607
IEEE 802.11 DISTRIBUTED FOUNDATION WIRELESS MAC……Page 618
REFERENCES……Page 621
Reviews
There are no reviews yet.