Chapter 1 Applications, Technologies, and Standards in
Secure Wireless Networks and Communications
Lei Chen
1.1 Introduction
1.2 Overview of Security in Cellular
Networks and Communications
1.3 Overview of Security in WLANs
1.4 Overview of Security in WMANs
1.5 Overview of Security in Bluetooth
Networks and Communications
1.6 Overview of Security in VANETs
1.7 Overview of Security in WSNs
1.8 Overview of Security in WMNs
1.9 Overview of Security in RFID Networks
and Communications
1.10 Summary
References
Chapter 2 Security in Cellular Networks and
Communications
Chuan-Kun Wu
2.1 Introduction
2.2 Security architecture of cellular
communication networks
2.3 Security techniques in GSM networks
2.4 Security techniques in 3G networks
2.5 Security techniques in LTE networks
2.6 Security issues in femtocell
2.7 Privacy issues in cellular networks
2.8 Security issues of mobile devices
2.9 Concluding remarks
References
Chapter 3 Security in Wireless Local Area Networks
Chao Yang and Guofei Gu
3.1 Introduction to WLAN
3.2 Current State of WLAN Security
3.3 WLAN Communication Security
3.4 WLAN Access Point Security
3.5 Other WLAN Security Issues
3.6 Conclusion
References
Chapter 4 Security in Wireless Metropolitan Area
Networks
Lei Chen, Narasimha Shashidhar, Shengli Yuan, and Ming
Yang
4.1 Introduction
4.2 Fundamentals of WiMAX
4.3 WiMAX security goals and solutions
4.4 WiMAX security vulnerabilities, threats,
and countermeasures
4.5 Summary
References
Chapter 5 Security in Bluetooth Networks and
Communications
Lei Chen, Peter Cooper, and Qingzhong Liu
5.1 Introduction
5.2 Bluetooth Primer
5.3 Bluetooth Security Solutions
5.4 Bluetooth Security Vulnerabilities,
Threats, and Countermeasures
5.5 Conclusion
References
Chapter 6 Security in Vehicular Ad Hoc Networks
VANETs
Weidong Yang
6.1 Introduction
6.2 Security Architecture Framework for
Vehicular Ad Hoc Networks
6.3 Secure Communication protocols for
Vehicular Ad Hoc Network
6.4 Privacy Enhancing and Secure
Positioning
6.5 Conclusion
References
Chapter 7 Security in Wireless Sensor Networks
Weiping Wang, Shigeng Zhang, Guihua Duan, and Hong
Song
7.1 Introduction
7.2 Key management in WSNs
7.3 Secure routing protocols in WSNs
7.4 Location privacy protections in WSNs
7.5 Secure data aggregation
7.6 Conclusion
References
Chapter 8 Security in Wireless Sensor Networks
Ping Li, Limin Sun, Xiangyan Fu, and Lin Ning
8.1 Introduction
8.2 Overview of security architecture for
WSN
8.3 Cryptographic Approaches
8.4 Resilience on Key Management
8.5 Trust Management
8.6 Location Privacy
8.7 Conclusion
References
Chapter 9 Security in Wireless Mesh Networks
Chung-wei Lee
9.1 Introduction
9.2 Wireless Mesh Networks WMN
Characteristics
9.3 WMN Security Vulnerabilities
9.4 WMN Defense Mechanisms
9.5 WMN Security Standards and Products
9.6 Conclusion
References
Chapter 10 Security in RFID Networks and
Communications
Chiu C. Tan and Jie Wu
10.1 Introduction
10.2 RFID Network Primer
10.3 Security Requirements
10.4 Hardware Based Solutions
10.5 Basic Protocol Based Solutions
10.6 Advance Protocol Based Solutions
10.7 Commercial RFID Security
10.8 Conclusion
References
Index