๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Mobile and Wireless Networks Security

โœ Scribed by Maryline Laurent-Maknavickius, Hakima Chaouchi


Publisher
World Scientific Publishing Company
Year
2008
Tongue
English
Leaves
88
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications networks were the first concretization of mobile telephony, followed by a set of wireless technologies with or without embedded mobility and with or without infrastructure. Obviously, this large deployment of services over mobile and wireless networks is not easy from a network security point of view. This book presents selected up-to-date research on security in wireless and mobile environments, mainly WiFi and self-organized networks such as ad-hoc networks. The selected research work was peer-reviewed and presented at the Mobile and Wireless Networks Security (MWNS) 2008 Workshop in Singapore.

โœฆ Table of Contents


CONTENTS......Page 6
Message from the General Chairs......Page 8
MWNS 2008 Committees......Page 10
1. Introduction......Page 12
2. AAA in ad hoc networks......Page 14
3. Related work: AAA architecture over infrastructure based ad hoc networks......Page 15
4. A proposed AAA architecture over infrastrureless/standalone ad hoc network......Page 18
References......Page 21
1. Introduction......Page 24
2.1. P2P Worms......Page 26
2.3. The Eclipse Attack......Page 28
2.5. Poisoning files......Page 29
3.1. Using server-list priority change......Page 30
4.1. Topology change attack by redirecting signal flow......Page 31
4.2. Topology change attack by redirecting downloading flow......Page 33
4.3. Topology change attack by redirecting signalling and downloading flows......Page 34
References......Page 35
1. Introduction......Page 38
2. Related Work......Page 40
4. Pairing with a Unidirectional OOB Channel......Page 41
4.1. Encoding using LEDs......Page 42
4.2.1. Detection of LEDs and Retrieval of SAS data from Video Frames......Page 43
4.3. Experimental Setup......Page 45
4.5. Other Applications of Our Implementation......Page 46
References......Page 47
1. Introduction......Page 50
2.1. Verification of Diffie-Hellman......Page 51
2.2. Verification tools......Page 53
3. Brief description of LCDP......Page 54
3.2. LCDP details......Page 55
3.3. Putting it altogether......Page 56
4.1. Formal specification of LCDP......Page 57
4.2. Verifications using AVISPA and SPAN......Page 59
References......Page 63
1. Introduction......Page 66
2. Secure Service Discovery Models......Page 67
2.2. Decentralized Discovery Model......Page 68
3. Matching Probabilities......Page 69
4.1. System Setup......Page 70
4.2. Rejection Rate......Page 72
4.3. Average Number of Users in the System......Page 73
4.4. Service Time Duration of a Request in the System......Page 74
5. Conclusion......Page 75
References......Page 76
1. Introduction......Page 78
2. Letter-envelope protocol......Page 80
3. Proposed Solution......Page 82
3.1. Association......Page 83
3.2. Disassociation......Page 84
4. Implementation and Evaluation......Page 86
References......Page 87


๐Ÿ“œ SIMILAR VOLUMES


Wireless and Mobile Networks Security
โœ Hakima Chaouchi, Maryline Laurent-Maknavicius ๐Ÿ“‚ Library ๐Ÿ“… 2009 ๐Ÿ› Wiley ๐ŸŒ English

This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security

Security in Wireless Mesh Networks (Wire
โœ Yan Zhang, Jun Zheng, Honglin Hu ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐ŸŒ English

Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, l