Description

Book Synopsis
This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This material will be of invaluable use to all those working in the network security field, and especially to the many people entering the field. The next area of focus is on the security issues and available solutions associated with off-the-shelf wireless and mobile technologies such as Bluetooth, WiFi, WiMax, 2G, and 3G. There is coverage of the security techniques used to protect applications downloaded by mobile terminals through mobile cellular networks, and finally the book addresses security issues and solutions in emerging wireless and mobile technologies such as ad hoc and sensor networks, cellular 4G and IMS networks.

Table of Contents

Introduction. xvii

PART 1. Basic Concepts 1

Chapter 1. Introduction to Mobile and Wireless Networks 3
Hakima CHAOUCHI and Tara ALI YAHIYA

1.1. Introduction 3

1.2. Mobile cellular networks 4

1.3. IEEE wireless networks 13

1.4. Mobile Internet networks 32

1.5. Current trends 42

1.6. Conclusions 44

1.7. Bibliography 45

Chapter 2. Vulnerabilities of Wired and Wireless Networks 47
Artur HECKER

2.1. Introduction 47

2.2. Security in the digital age 48

2.3. Threats and risks to telecommunications systems 55

2.4. From wireline vulnerabilities to vulnerabilities in wireless communications 67

2.5. Conclusions 70

2.6. Bibliography 71

Chapter 3. Fundamental Security Mechanisms 73
Maryline LAURENT-MAKNAVICIUS, Hakima CHAOUCHI and Olivier PAUL

3.1. Introduction 73

3.2. Basics on security 73

3.3. Secure communication protocols and VPN implementation 88

3.4. Authentication 105

3.5. Access control 118

3.6. Conclusions126

3.7. Bibliography 126

Chapter 4. Wi-Fi Security Dedicated Architectures 131
Franck VEYSSET, Laurent BUTTI and Jerôme RAZNIEWSKI

4.1. Introduction 131

4.2. Hot spot architecture: captive portals131

4.3. Wireless intrusion detection systems (WIDS) 137

4.4. Wireless honeypots 145

Chapter 5. Multimedia Content Watermarking 149
Mihai MITREA and Françoise PRÊTEUX

5.1. Introduction 149

5.2. Robust watermarking: a new challenge for the information society 150

5.3. Different constraints for different types of media 157

5.4. Toward the watermarking theoretical model 172

5.5. Discussion and perspectives 188

5.6. Conclusion 195

5.7. Bibliography 196

PART 2. Off-the Shelf Technologies 203

Chapter 6. Bluetooth Security 205
Franck GILLET

6.1. Introduction 205

6.2. Bluetooth technical specification 207

6.3. Bluetooth security 220

6.4. Conclusion 228

6.5. Bibliography 229

Chapter 7. Wi-Fi Security 231
Guy PUJOLLE

7.1. Introduction 231

7.2. Attacks on wireless networks 232

7.3. Security in the IEEE 802.11 standard 235

7.4. Security in 802.1x 245

7.5. Security in 802.11i 249

7.6. Authentication in wireless networks 258

7.7. Layer 3 security mechanisms 263

7.8. Bibliography 270

Chapter 8. WiMAX Security 271
Pascal URIEN, translated by Léa URIEN

8.1. Introduction 271

8.2. WiMAX low layers 276

8.3. Security according to 802.16-2004 283

8.4. Security according to the IEEE-802.16e standard 293

8.5. The role of the smart card in WiMAX infrastructures 308

8.6. Conclusion 311

8.7. Glossary 311

8.8. Bibliography 313

Chapter 9. Security in Mobile Telecommunication Networks 315
Jérôme HÄRRI and Christian BONNET

9.1. Introduction 315

9.2. Signaling 317

9.3. Security in the GSM 326

9.4. GPRS security 338

9.5. 3G security 349

9.6. Network interconnection 356

9.7. Conclusion 357

9.8. Bibliography 358

Chapter 10. Security of Downloadable Applications 361
Pierre CRÉGUT, Isabelle RAVOT and Cuihtlauac ALVARADO

10.1. Introduction 361

10.2. Opening the handset 362

10.3. Security policy 363

10.4. The implementation of a security policy 368

10.5. Execution environments for active contents 370

10.6. Validation of active contents 382

10.7. Detection of attacks 391

10.8. Conclusion 402

10.9. Bibliography 404

PART 3. Emerging Technologies 409

Chapter 11. Security in Next Generation Mobile Networks 411
Jérôme HÄRRI and Christian BONNET

11.1. Introduction 411

11.2. The SIP 414

11.3. VoIP 418

11.4. IP Multimedia Subsystem (IMS) 422

11.5. 4G security 429

11.6. Confidentiality 431

11.7. Conclusion 433

11.8. Bibliography 434

Chapter 12. Security of IP-Based Mobile Networks 437
Jean-Michel COMBES, Daniel MIGAULT, Julien BOURNELLE, Hakima CHAOUCHI and Maryline LAURENT-MAKNAVICIUS

12.1. Introduction 437

12.2. Security issues related to mobility 438

12.3. Mobility with MIPv6 442

12.4. Mobility with Mobile IPv4 457

12.5. Mobility with MOBIKE 460

12.6. IP mobility with HIP and NetLMM 462

12.7. Conclusions 467

12.8. Glossary 468

12.9. Bibliography 470

Chapter 13. Security in Ad Hoc Networks 475
Jean-Marie ORSET and Ana CAVALLI

13.1. Introduction 475

13.2. Motivations and application fields 475

13.3. Routing protocols 479

13.4. Attacks to routing protocols 484

13.5. Security mechanisms 490

13.6. Auto-configuration 514

13.7. Conclusion 519

13.8. Bibliography 521

Chapter 14. Key Management in Ad Hoc Networks 525
Mohamed SALAH BOUASSIDA, Isabelle CHRISMENT and Olivier FESTOR

14.1. Introduction 525

14.2. Authentication issue within ad hoc networks 526

14.3. Group key management within ad hoc networks 534

14.4. Discussions 554

14.5. Conclusions 560

14.6. Bibliography 561

Chapter 15. Wireless Sensor Network Security 565
José-Marcos NOGUEIRA, Hao-Chi WONG, Antonio A.F. LOUREIRO, Chakib BEKARA, Maryline LAURENT-MAKNAVICIUS, Ana Paula RIBEIRO DA SILVA, Sérgio de OLIVEIRA and Fernando A. TEIXEIRA

15.1. Introduction 565

15.2. Attacks on wireless sensor networks and counter-measures 567

15.3. Prevention mechanisms: authentication and traffic protection 571

15.4. Case study: centralized and passive intruder detection 582

15.5. Case study: decentralized intrusion detection 589

15.6. Case study: intrusion tolerance with multiple routes 598

15.7. Conclusion 607

15.8. Bibliography 609

Chapter 16. Key Management in Wireless Sensor Networks 613
Chakib BEKARA and Maryline LAURENT-MAKNAVICIUS

16.1. Introduction 613

16.2. Introduction to key management 614

16.3. Security needs of WSNs 616

16.4. Key management problems in WSNs 617

16.5. Metric for evaluating key management protocols in WSNs 620

16.6. Classification of key management protocols in WSNs 621

16.7. Notations and assumptions 622

16.8. Broadcast source authentication protocols 623

16.9. Probabilistic key management protocols 627

16.10. Deterministic key management protocols 631

16.11. Hybrid key management protocols 637

16.12. Comparison of key management protocols in WSNs 641

16.13. Conclusion 646

16.14. Bibliography 647

Conclusion 649

List of Authors 653

Index 657

Wireless and Mobile Network Security

Product form

£294.45

Includes FREE delivery

RRP £309.95 – you save £15.50 (5%)

Order before 4pm today for delivery by Tue 3 Feb 2026.

A Hardback by Hakima Chaouchi, Maryline Laurent-Maknavicius

10 in stock


    View other formats and editions of Wireless and Mobile Network Security by Hakima Chaouchi

    Publisher: ISTE Ltd and John Wiley & Sons Inc
    Publication Date: 05/06/2009
    ISBN13: 9781848211179, 978-1848211179
    ISBN10: 1848211171

    Description

    Book Synopsis
    This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This material will be of invaluable use to all those working in the network security field, and especially to the many people entering the field. The next area of focus is on the security issues and available solutions associated with off-the-shelf wireless and mobile technologies such as Bluetooth, WiFi, WiMax, 2G, and 3G. There is coverage of the security techniques used to protect applications downloaded by mobile terminals through mobile cellular networks, and finally the book addresses security issues and solutions in emerging wireless and mobile technologies such as ad hoc and sensor networks, cellular 4G and IMS networks.

    Table of Contents

    Introduction. xvii

    PART 1. Basic Concepts 1

    Chapter 1. Introduction to Mobile and Wireless Networks 3
    Hakima CHAOUCHI and Tara ALI YAHIYA

    1.1. Introduction 3

    1.2. Mobile cellular networks 4

    1.3. IEEE wireless networks 13

    1.4. Mobile Internet networks 32

    1.5. Current trends 42

    1.6. Conclusions 44

    1.7. Bibliography 45

    Chapter 2. Vulnerabilities of Wired and Wireless Networks 47
    Artur HECKER

    2.1. Introduction 47

    2.2. Security in the digital age 48

    2.3. Threats and risks to telecommunications systems 55

    2.4. From wireline vulnerabilities to vulnerabilities in wireless communications 67

    2.5. Conclusions 70

    2.6. Bibliography 71

    Chapter 3. Fundamental Security Mechanisms 73
    Maryline LAURENT-MAKNAVICIUS, Hakima CHAOUCHI and Olivier PAUL

    3.1. Introduction 73

    3.2. Basics on security 73

    3.3. Secure communication protocols and VPN implementation 88

    3.4. Authentication 105

    3.5. Access control 118

    3.6. Conclusions126

    3.7. Bibliography 126

    Chapter 4. Wi-Fi Security Dedicated Architectures 131
    Franck VEYSSET, Laurent BUTTI and Jerôme RAZNIEWSKI

    4.1. Introduction 131

    4.2. Hot spot architecture: captive portals131

    4.3. Wireless intrusion detection systems (WIDS) 137

    4.4. Wireless honeypots 145

    Chapter 5. Multimedia Content Watermarking 149
    Mihai MITREA and Françoise PRÊTEUX

    5.1. Introduction 149

    5.2. Robust watermarking: a new challenge for the information society 150

    5.3. Different constraints for different types of media 157

    5.4. Toward the watermarking theoretical model 172

    5.5. Discussion and perspectives 188

    5.6. Conclusion 195

    5.7. Bibliography 196

    PART 2. Off-the Shelf Technologies 203

    Chapter 6. Bluetooth Security 205
    Franck GILLET

    6.1. Introduction 205

    6.2. Bluetooth technical specification 207

    6.3. Bluetooth security 220

    6.4. Conclusion 228

    6.5. Bibliography 229

    Chapter 7. Wi-Fi Security 231
    Guy PUJOLLE

    7.1. Introduction 231

    7.2. Attacks on wireless networks 232

    7.3. Security in the IEEE 802.11 standard 235

    7.4. Security in 802.1x 245

    7.5. Security in 802.11i 249

    7.6. Authentication in wireless networks 258

    7.7. Layer 3 security mechanisms 263

    7.8. Bibliography 270

    Chapter 8. WiMAX Security 271
    Pascal URIEN, translated by Léa URIEN

    8.1. Introduction 271

    8.2. WiMAX low layers 276

    8.3. Security according to 802.16-2004 283

    8.4. Security according to the IEEE-802.16e standard 293

    8.5. The role of the smart card in WiMAX infrastructures 308

    8.6. Conclusion 311

    8.7. Glossary 311

    8.8. Bibliography 313

    Chapter 9. Security in Mobile Telecommunication Networks 315
    Jérôme HÄRRI and Christian BONNET

    9.1. Introduction 315

    9.2. Signaling 317

    9.3. Security in the GSM 326

    9.4. GPRS security 338

    9.5. 3G security 349

    9.6. Network interconnection 356

    9.7. Conclusion 357

    9.8. Bibliography 358

    Chapter 10. Security of Downloadable Applications 361
    Pierre CRÉGUT, Isabelle RAVOT and Cuihtlauac ALVARADO

    10.1. Introduction 361

    10.2. Opening the handset 362

    10.3. Security policy 363

    10.4. The implementation of a security policy 368

    10.5. Execution environments for active contents 370

    10.6. Validation of active contents 382

    10.7. Detection of attacks 391

    10.8. Conclusion 402

    10.9. Bibliography 404

    PART 3. Emerging Technologies 409

    Chapter 11. Security in Next Generation Mobile Networks 411
    Jérôme HÄRRI and Christian BONNET

    11.1. Introduction 411

    11.2. The SIP 414

    11.3. VoIP 418

    11.4. IP Multimedia Subsystem (IMS) 422

    11.5. 4G security 429

    11.6. Confidentiality 431

    11.7. Conclusion 433

    11.8. Bibliography 434

    Chapter 12. Security of IP-Based Mobile Networks 437
    Jean-Michel COMBES, Daniel MIGAULT, Julien BOURNELLE, Hakima CHAOUCHI and Maryline LAURENT-MAKNAVICIUS

    12.1. Introduction 437

    12.2. Security issues related to mobility 438

    12.3. Mobility with MIPv6 442

    12.4. Mobility with Mobile IPv4 457

    12.5. Mobility with MOBIKE 460

    12.6. IP mobility with HIP and NetLMM 462

    12.7. Conclusions 467

    12.8. Glossary 468

    12.9. Bibliography 470

    Chapter 13. Security in Ad Hoc Networks 475
    Jean-Marie ORSET and Ana CAVALLI

    13.1. Introduction 475

    13.2. Motivations and application fields 475

    13.3. Routing protocols 479

    13.4. Attacks to routing protocols 484

    13.5. Security mechanisms 490

    13.6. Auto-configuration 514

    13.7. Conclusion 519

    13.8. Bibliography 521

    Chapter 14. Key Management in Ad Hoc Networks 525
    Mohamed SALAH BOUASSIDA, Isabelle CHRISMENT and Olivier FESTOR

    14.1. Introduction 525

    14.2. Authentication issue within ad hoc networks 526

    14.3. Group key management within ad hoc networks 534

    14.4. Discussions 554

    14.5. Conclusions 560

    14.6. Bibliography 561

    Chapter 15. Wireless Sensor Network Security 565
    José-Marcos NOGUEIRA, Hao-Chi WONG, Antonio A.F. LOUREIRO, Chakib BEKARA, Maryline LAURENT-MAKNAVICIUS, Ana Paula RIBEIRO DA SILVA, Sérgio de OLIVEIRA and Fernando A. TEIXEIRA

    15.1. Introduction 565

    15.2. Attacks on wireless sensor networks and counter-measures 567

    15.3. Prevention mechanisms: authentication and traffic protection 571

    15.4. Case study: centralized and passive intruder detection 582

    15.5. Case study: decentralized intrusion detection 589

    15.6. Case study: intrusion tolerance with multiple routes 598

    15.7. Conclusion 607

    15.8. Bibliography 609

    Chapter 16. Key Management in Wireless Sensor Networks 613
    Chakib BEKARA and Maryline LAURENT-MAKNAVICIUS

    16.1. Introduction 613

    16.2. Introduction to key management 614

    16.3. Security needs of WSNs 616

    16.4. Key management problems in WSNs 617

    16.5. Metric for evaluating key management protocols in WSNs 620

    16.6. Classification of key management protocols in WSNs 621

    16.7. Notations and assumptions 622

    16.8. Broadcast source authentication protocols 623

    16.9. Probabilistic key management protocols 627

    16.10. Deterministic key management protocols 631

    16.11. Hybrid key management protocols 637

    16.12. Comparison of key management protocols in WSNs 641

    16.13. Conclusion 646

    16.14. Bibliography 647

    Conclusion 649

    List of Authors 653

    Index 657

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account