注册 登录 进入教材巡展
#
  • #

出版时间:2013年5月

出版社:高等教育出版社

以下为《无线网络安全——理论与应用(英文版)》的配套数字资源,这些资源在您购买图书后将免费附送给您:
  • 高等教育出版社
  • 9787040366808
  • 1版
  • 29293
  • 0045155698-9
  • 特殊
  • 2013年5月
  • 400
  • 200
  • 工学
  • 信息与通信工程
  • TN92
  • 信息安全、计算机类
  • 研究生
内容简介
陈磊、季家凰、张自洪编写的《无线网络安全--理论与应用(英文版)/新一代信息科学与技术丛书》是与Springer合作出版的英文专著。
全书内容包含了经典及最新的无线网络安全的算法、机理和技术,讨论了无线网络的安全问题,如WLAN、蓝牙、卫星、MANET、传感器网络等。全书既包含理论讲述,也注重实践技术应用,同时反映了无线网络安全领域的新进展。
《无线网络安全--理论与应用(英文版)/新一代信息科学与技术丛书》可供信息安全等学科从事研究及应用的科研人员使用,也可供高年级本科生及研究生在学习相关课程时参考使用。
目录

Chapter 1  Applications, Technologies, and Standards in Secure Wireless Networks and Communications


  Lei Chen


    1.1  Introduction


    1.2  Overview of Security in Cellular Networks and Communications


    1.3  Overview of Security in WLANs


    1.4  Overview of Security in WMANs


    1.5  Overview of Security in Bluetooth Networks and Communications


    1.6  Overview of Security in VANETs


    1.7  Overview of Security in WSNs


    1.8  Overview of Security in WMNs


    1.9  Overview of Security in RFID Networks and Communications


    1.10  Summary


    References


Chapter 2  Security in Cellular Networks and Communications


  Chuan-Kun Wu


    2.1  Introduction


    2.2  Security architecture of cellular communication networks


    2.3  Security techniques in GSM networks


    2.4  Security techniques in 3G networks


    2.5  Security techniques in LTE networks


    2.6  Security issues in femtocell


    2.7  Privacy issues in cellular networks


    2.8  Security issues of mobile devices


    2.9  Concluding remarks


    References


Chapter 3  Security in Wireless Local Area Networks


  Chao Yang and Guofei Gu


    3.1  Introduction to WLAN


    3.2  Current State of WLAN Security


    3.3  WLAN Communication Security


    3.4  WLAN Access Point Security


    3.5  Other WLAN Security Issues


    3.6  Conclusion


    References


Chapter 4  Security in Wireless Metropolitan Area Networks


  Lei Chen, Narasimha Shashidhar, Shengli Yuan, and Ming Yang


    4.1  Introduction


    4.2  Fundamentals of WiMAX


    4.3  WiMAX security goals and solutions


    4.4  WiMAX security vulnerabilities, threats, and countermeasures


    4.5  Summary


    References


Chapter 5  Security in Bluetooth Networks and Communications


  Lei Chen, Peter Cooper, and Qingzhong Liu


    5.1  Introduction


    5.2  Bluetooth Primer


    5.3  Bluetooth Security Solutions


    5.4  Bluetooth Security Vulnerabilities, Threats, and Countermeasures


    5.5  Conclusion


    References


Chapter 6  Security in Vehicular Ad Hoc Networks (VANETs)


  Weidong Yang


    6.1  Introduction


    6.2  Security Architecture Framework for Vehicular Ad Hoc Networks


    6.3  Secure Communication protocols for Vehicular Ad Hoc Network


    6.4  Privacy Enhancing and Secure Positioning


    6.5  Conclusion


    References


Chapter 7  Security in Wireless Sensor Networks


  Weiping Wang, Shigeng Zhang, Guihua Duan, and Hong Song


    7.1  Introduction


    7.2  Key management in WSNs


    7.3  Secure routing protocols in WSNs


    7.4  Location privacy protections in WSNs


    7.5  Secure data aggregation


    7.6  Conclusion


    References


Chapter 8  Security in Wireless Sensor Networks


  Ping Li, Limin Sun, Xiangyan Fu, and Lin Ning


    8.1  Introduction


    8.2  Overview of security architecture for WSN


    8.3  Cryptographic Approaches


    8.4  Resilience on Key Management


    8.5  Trust Management


    8.6  Location Privacy


    8.7  Conclusion


    References


Chapter 9  Security in Wireless Mesh Networks


  Chung-wei Lee


    9.1  Introduction


    9.2  Wireless Mesh Networks (WMN) Characteristics


    9.3  WMN Security Vulnerabilities


    9.4  WMN Defense Mechanisms


    9.5  WMN Security Standards and Products


    9.6  Conclusion


    References


Chapter 10  Security in RFID Networks and Communications


  Chiu C. Tan and Jie Wu


    10.1  Introduction


    10.2  RFID Network Primer


    10.3  Security Requirements


    10.4  Hardware Based Solutions


    10.5  Basic Protocol Based Solutions


    10.6  Advance Protocol Based Solutions


    10.7  Commercial RFID Security


    10.8  Conclusion


    References


Index