图书介绍
无线网络安全 理论与应用 英文版PDF|Epub|txt|kindle电子书版本网盘下载
![无线网络安全 理论与应用 英文版](https://www.shukui.net/cover/47/31003901.jpg)
- 陈磊,季家凰,张自洪主编 著
- 出版社: 北京:高等教育出版社
- ISBN:9787040366808
- 出版时间:2013
- 标注页数:274页
- 文件大小:65MB
- 文件页数:284页
- 主题词:无线网-安全技术-教材-英文
PDF下载
下载说明
无线网络安全 理论与应用 英文版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Chapter 1 Applications,Technologies,and Standards in Secure Wireless NetWorks and Communications1
Lei Chen1
1.1 Introduction1
1.2 Overview of Security in Cellular Networks and Communications3
1.3 Overview of Security in WLANs3
1.4 Overview of Security in WMANs4
1.5 Overview of Security in Bluetooth Networks and Communications5
1.6 Overview of Security in VANETs5
1.7 Overview of Security in WSNs6
1.8 Overview of Security in WMNs6
1.9 Overview of Security in RFID Networks and Communications7
1.10 Summary7
References8
Chapter 2 Security in Cellular NetWorks and Communications9
Chuan-Kun Wu10
2.1 Introduction10
2.2 Security architecture of cellular communication networks12
2.3 Security techniques in GSM networks14
2.4 Security techniques in 3G networks22
2.5 Security techniques in LTE networks25
2.6 Security issues in femtocell33
2.7 Privacy issues in cellular networks34
2.8 Security issues of mobile devices35
2.9 Concluding remarks35
References36
Chapter 3 Security in Wireless Local Area NetWorks39
Chao Yang and Guofei Gu39
3.1 Introduction to WLAN39
3.2 Current State of WLAN Security42
3.3 WLAN Communication Security46
3.4 WLAN Access Point Security53
3.5 Other WLAN Security Issues55
3.6 Conclusion56
References56
Chapter 4 Security in Wireless Metropolitan Area NetWorks59
Lei Chen,Narasimha Shashidhar,Shengli Yuan,and Ming Yang60
4.1 Introduction60
4.2 Fundamentals of WiMAX61
4.3 WiMAX security goals and solutions63
4.4 WiMAX security Vulnerabilities,threats,and countermeasures72
4.5 Summary73
References74
Chapter 5 Security in Bluetooth NetWorks and Communications77
Lei Chen,Peter Cooper,and Qingzhong Liu77
5.1 Introduction77
5.2 Bluetooth Primer78
5.3 Bluetooth Security Solutions82
5.4 Bluetooth Security Vulnerabilities,Threats,and Countermeasures90
5.5 Conclusion92
References93
Chapter 6 Security in Vehicular Ad Hoc NetWorks(VANETs)95
Weidong Yang95
6.1 Introduction95
6.2 Security Architecture Framework for Vehicular Ad Hoc Networks101
6.3 Secure Communication protocols for Vehicular Ad Hoc Network115
6.4 Privacy Enhancing and Secure Positioning120
6.5 Conclusion126
References127
Chapter 7 Security in Wireless Sensor NetWorks129
Weiping Wang,Shigeng Zhang.Guihua Duan,and Hong Song129
7.1 Introduction129
7.2 Key management in WSNs131
7.3 Secure routing protocols in WSNs144
7.4 Location privacy protections in WSNs153
7.5 Secure data aggregation161
7.6 Conclusion172
References172
Chapter 8 Security in Wireless Sensor NetWorks179
Ping Li,Limin Sun,Xiangyan Fu,and Lin Ning179
8.1 Introduction179
8.2 Overview of security architecture for WSN181
8.3 Cryptographic Approaches189
8.4 Resilience on Key Management195
8.5 Tust Management200
8.6 Location Privacy214
8.7 Conclusion220
References221
Chapter 9 Security in Wireless Mesh NetWorks229
Chung-wei Lee229
9.1 Introduction229
9.2 Wireless Mesh Networks(WMN)Characteristics231
9.3 WMN Security Vulnerabilities234
9.4 WMN Defense Mechanisms236
9.5 WMN Security Standards and Products243
9.6 Conclusion244
References244
Chapter 10 Security in RFID Networks and Communications247
Chiu C.Tan and Jie Wu247
10.1 Introduction247
10.2 RFID Network Primer248
10.3 Security Requirements252
10.4 Hardware Based Solutions253
10.5 Basic Protocol Based Solutions254
10.6 Advance Protocol Based Solutions258
10.7 Commercial RFID Security260
10.8 Conclusion264
References265
Index269