𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Wireless and mobile network security

✍ Scribed by P. Venkataram; B Satish Babu


Publisher
Tata McGraw-Hill
Year
2010
Tongue
English
Leaves
244
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Cover
Half Title
About the Authors
Title Page
Copyright
Dedication
Contents
1. Security Issues in Mobile Communications
1.1 Mobile Communication History
1.2 Securityβ€”Wired vs Wireless
1.3 Security Issues in Wireless and Mobile Communications
1.4 Security Requirements in Wireless and Mobile Communications
1.5 Security for Mobile Applications
1.6 Advantages and Disadvantages of Application-level Security
Summary
Review Questions
2. Security at Device, Network, and Server Levels
2.1 Mobile Devices’ Security Requirements
2.2 Mobile Wireless Network Level Security
2.3 Server Level Security
Summary
Review Questions
3. Application Level Security in Wireless Networks
3.1 Application of WLANs
3.2 Wireless Threats
3.3 Some Vulnerabilities and Attack Methods over WLANs
3.4 Security for 1G Wi-Fi Applications
3.5 Security for 2G Wi-Fi Applications
3.6 Recent Security Schemes for Wi-Fi Applications
Summary
Review Questions
4. Application Level Security in Cellular Networks
4.1 Generations of Cellular Networks
4.2 Security Issues and Attacks in Cellular Networks
4.3 GSM Security for Applications
4.4 GPRS Security for Applications
4.5 UMTS Security for Applications
4.6 3G Security for Applications
Some of Security and Authentication Solutions
Summary
Review Questions
5. Application Level Security in MANETs
5.1 MANETs
5.2 Some Applications of MANETs
5.3 MANET Features
5.4 Security Challenges in MANETs
5.5 Security Attacks on MANETs
5.6 External Threats for MANET Applications
5.7 Internal Threats for MANET Applications
5.8 Some of the Security Solutions
Summary
Review Questions
6. Application Level Security in Ubiquitous Networks
6.1 Ubiquitous Computing
6.2 Need for Novel Security Schemes for UC
6.3 Security Challenges for UC
6.4 Security Attacks on UC Networks
6.5 Some of the Security Solutions for UC
Summary
Review Questions
7. Application Level Security in Heterogeneous Wireless Networks
7.1 Introduction
7.2 Some of the Heterogeneous Wireless Network Architectures
7.3 Heterogeneous Network Application in Disaster Management
7.4 Security Problems and Attacks in Heterogeneous Wireless Networks
7.5 Some Security Solutions for Heterogeneous Wireless Networks
Summary
Review Questions
8. Security for Mobile Commerce Application
8.1 M-commerce Applications
8.2 M-commerce Initiatives
8.3 Security Challenges in Mobile E-commerce
8.4 Types of Attacks on Mobile E-commerce
8.5 A Secure M-commerce Model Based on Wireless Local Area Network
8.6 Some of M-Commerce Security Solutions
Summary
Review Questions
Index


πŸ“œ SIMILAR VOLUMES


Mobile and Wireless Networks Security
✍ Maryline Laurent-Maknavickius, Hakima Chaouchi πŸ“‚ Library πŸ“… 2008 πŸ› World Scientific Publishing Company 🌐 English

Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet

Wireless and Mobile Networks Security
✍ Hakima Chaouchi, Maryline Laurent-Maknavicius πŸ“‚ Library πŸ“… 2009 πŸ› Wiley 🌐 English

This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security

Security in Wireless Mesh Networks (Wire
✍ Yan Zhang, Jun Zheng, Honglin Hu πŸ“‚ Library πŸ“… 2008 🌐 English

Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, l