图书介绍

无线网络安全 理论与应用 英文版pdf电子书版本下载

无线网络安全  理论与应用  英文版
  • 陈磊,季家凰,张自洪主编 著
  • 出版社: 北京:高等教育出版社
  • ISBN:9787040366808
  • 出版时间:2013
  • 标注页数:274页
  • 文件大小:65MB
  • 文件页数:284页
  • 主题词:无线网-安全技术-教材-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快] 温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页 直链下载[便捷但速度慢]   [在线试读本书]   [在线获取解压码]

下载说明

无线网络安全 理论与应用 英文版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如 BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

Chapter 1 Applications,Technologies,and Standards in Secure Wireless NetWorks and Communications 1

Lei Chen 1

1.1 Introduction 1

1.2 Overview of Security in Cellular Networks and Communications 3

1.3 Overview of Security in WLANs 3

1.4 Overview of Security in WMANs 4

1.5 Overview of Security in Bluetooth Networks and Communications 5

1.6 Overview of Security in VANETs 5

1.7 Overview of Security in WSNs 6

1.8 Overview of Security in WMNs 6

1.9 Overview of Security in RFID Networks and Communications 7

1.10 Summary 7

References 8

Chapter 2 Security in Cellular NetWorks and Communications 9

Chuan-Kun Wu 10

2.1 Introduction 10

2.2 Security architecture of cellular communication networks 12

2.3 Security techniques in GSM networks 14

2.4 Security techniques in 3G networks 22

2.5 Security techniques in LTE networks 25

2.6 Security issues in femtocell 33

2.7 Privacy issues in cellular networks 34

2.8 Security issues of mobile devices 35

2.9 Concluding remarks 35

References 36

Chapter 3 Security in Wireless Local Area NetWorks 39

Chao Yang and Guofei Gu 39

3.1 Introduction to WLAN 39

3.2 Current State of WLAN Security 42

3.3 WLAN Communication Security 46

3.4 WLAN Access Point Security 53

3.5 Other WLAN Security Issues 55

3.6 Conclusion 56

References 56

Chapter 4 Security in Wireless Metropolitan Area NetWorks 59

Lei Chen,Narasimha Shashidhar,Shengli Yuan,and Ming Yang 60

4.1 Introduction 60

4.2 Fundamentals of WiMAX 61

4.3 WiMAX security goals and solutions 63

4.4 WiMAX security Vulnerabilities,threats,and countermeasures 72

4.5 Summary 73

References 74

Chapter 5 Security in Bluetooth NetWorks and Communications 77

Lei Chen,Peter Cooper,and Qingzhong Liu 77

5.1 Introduction 77

5.2 Bluetooth Primer 78

5.3 Bluetooth Security Solutions 82

5.4 Bluetooth Security Vulnerabilities,Threats,and Countermeasures 90

5.5 Conclusion 92

References 93

Chapter 6 Security in Vehicular Ad Hoc NetWorks(VANETs) 95

Weidong Yang 95

6.1 Introduction 95

6.2 Security Architecture Framework for Vehicular Ad Hoc Networks 101

6.3 Secure Communication protocols for Vehicular Ad Hoc Network 115

6.4 Privacy Enhancing and Secure Positioning 120

6.5 Conclusion 126

References 127

Chapter 7 Security in Wireless Sensor NetWorks 129

Weiping Wang,Shigeng Zhang.Guihua Duan,and Hong Song 129

7.1 Introduction 129

7.2 Key management in WSNs 131

7.3 Secure routing protocols in WSNs 144

7.4 Location privacy protections in WSNs 153

7.5 Secure data aggregation 161

7.6 Conclusion 172

References 172

Chapter 8 Security in Wireless Sensor NetWorks 179

Ping Li,Limin Sun,Xiangyan Fu,and Lin Ning 179

8.1 Introduction 179

8.2 Overview of security architecture for WSN 181

8.3 Cryptographic Approaches 189

8.4 Resilience on Key Management 195

8.5 Tust Management 200

8.6 Location Privacy 214

8.7 Conclusion 220

References 221

Chapter 9 Security in Wireless Mesh NetWorks 229

Chung-wei Lee 229

9.1 Introduction 229

9.2 Wireless Mesh Networks(WMN)Characteristics 231

9.3 WMN Security Vulnerabilities 234

9.4 WMN Defense Mechanisms 236

9.5 WMN Security Standards and Products 243

9.6 Conclusion 244

References 244

Chapter 10 Security in RFID Networks and Communications 247

Chiu C.Tan and Jie Wu 247

10.1 Introduction 247

10.2 RFID Network Primer 248

10.3 Security Requirements 252

10.4 Hardware Based Solutions 253

10.5 Basic Protocol Based Solutions 254

10.6 Advance Protocol Based Solutions 258

10.7 Commercial RFID Security 260

10.8 Conclusion 264

References 265

Index 269

精品推荐