Chandra, Praphul0-7506-7746-5
Table of contents :
Cover……Page 1
Bulletproof Wireless Security……Page 2
Contents……Page 8
Preface……Page 12
Acknowledgments……Page 26
Acronyms……Page 28
About the Author……Page 34
1.1 What is Security?……Page 36
1.2 Cryptography……Page 38
1.3 Cryptanalysis……Page 48
1.4 Block Ciphers……Page 49
1.5 Stream Ciphers……Page 53
1.6 How Secure is Cryptography?……Page 57
1.7 Beyond Cryptography……Page 59
1.8 Conclusion……Page 63
2.2 Key Establishment Protocols……Page 64
2.3 Authentication Protocols……Page 73
2.4 Encryption Protocols……Page 89
2.5 Integrity Protocols……Page 96
3.1 Introduction……Page 102
3.2 Security at Layer 1……Page 103
3.3 Security at Layer 2……Page 104
3.4 Security at Layer 3……Page 110
3.5 Security at Layer 4: SSL/TLS……Page 115
3.6 Security at Layer 5+……Page 119
4 Voice-Oriented Wireless Networks……Page 120
4.1 The Wireless Medium……Page 121
4.2 The Cellular Architecture……Page 125
4.3 TWNs: First Generation……Page 128
4.4 TWNs: Second Generation……Page 133
4.5 TWNs: Third Generation……Page 139
4.6 The Overall Picture……Page 142
5.1 WLANs……Page 144
5.2 MANETs……Page 156
5.3 Wireless Networks in the Near Future……Page 162
6.2 Security in Second Generation TWNs……Page 164
6.3 Security in 2.5 Generation TWNs……Page 175
6.4 Security in 3G TWNs……Page 179
6.5 Summary……Page 193
7 Security in Wireless Local Area Networks……Page 194
7.2 Key Establishment in 802.11……Page 195
7.3 Anonymity in 802.11……Page 196
7.4 Authentication in 802.11……Page 197
7.5 Confidentiality in 802.11……Page 204
7.6 Data Integrity in 802.11……Page 209
7.7 Loopholes in 802.11 Security……Page 211
7.8 WPA……Page 212
7.9 WPA2 (802.11i)……Page 225
8.1 Introduction……Page 234
8.2 Routing in Multihop Ad Hoc Networks……Page 236
8.3 Key Establishment and Authentication……Page 240
8.5 Bluetooth……Page 245
References……Page 264
Index……Page 266
Reviews
There are no reviews yet.