Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet
Wireless and mobile network security
β Scribed by P. Venkataram; B Satish Babu
- Publisher
- Tata McGraw-Hill
- Year
- 2010
- Tongue
- English
- Leaves
- 244
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Table of Contents
Cover
Half Title
About the Authors
Title Page
Copyright
Dedication
Contents
1. Security Issues in Mobile Communications
1.1 Mobile Communication History
1.2 SecurityβWired vs Wireless
1.3 Security Issues in Wireless and Mobile Communications
1.4 Security Requirements in Wireless and Mobile Communications
1.5 Security for Mobile Applications
1.6 Advantages and Disadvantages of Application-level Security
Summary
Review Questions
2. Security at Device, Network, and Server Levels
2.1 Mobile Devicesβ Security Requirements
2.2 Mobile Wireless Network Level Security
2.3 Server Level Security
Summary
Review Questions
3. Application Level Security in Wireless Networks
3.1 Application of WLANs
3.2 Wireless Threats
3.3 Some Vulnerabilities and Attack Methods over WLANs
3.4 Security for 1G Wi-Fi Applications
3.5 Security for 2G Wi-Fi Applications
3.6 Recent Security Schemes for Wi-Fi Applications
Summary
Review Questions
4. Application Level Security in Cellular Networks
4.1 Generations of Cellular Networks
4.2 Security Issues and Attacks in Cellular Networks
4.3 GSM Security for Applications
4.4 GPRS Security for Applications
4.5 UMTS Security for Applications
4.6 3G Security for Applications
Some of Security and Authentication Solutions
Summary
Review Questions
5. Application Level Security in MANETs
5.1 MANETs
5.2 Some Applications of MANETs
5.3 MANET Features
5.4 Security Challenges in MANETs
5.5 Security Attacks on MANETs
5.6 External Threats for MANET Applications
5.7 Internal Threats for MANET Applications
5.8 Some of the Security Solutions
Summary
Review Questions
6. Application Level Security in Ubiquitous Networks
6.1 Ubiquitous Computing
6.2 Need for Novel Security Schemes for UC
6.3 Security Challenges for UC
6.4 Security Attacks on UC Networks
6.5 Some of the Security Solutions for UC
Summary
Review Questions
7. Application Level Security in Heterogeneous Wireless Networks
7.1 Introduction
7.2 Some of the Heterogeneous Wireless Network Architectures
7.3 Heterogeneous Network Application in Disaster Management
7.4 Security Problems and Attacks in Heterogeneous Wireless Networks
7.5 Some Security Solutions for Heterogeneous Wireless Networks
Summary
Review Questions
8. Security for Mobile Commerce Application
8.1 M-commerce Applications
8.2 M-commerce Initiatives
8.3 Security Challenges in Mobile E-commerce
8.4 Types of Attacks on Mobile E-commerce
8.5 A Secure M-commerce Model Based on Wireless Local Area Network
8.6 Some of M-Commerce Security Solutions
Summary
Review Questions
Index
π SIMILAR VOLUMES
This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, l