无线局域网安全接入
无线局域网安全接入封面图

无线局域网安全接入

马建峰等, 著

出版社:高等教育出版社

年代:2009

定价:58.0

书籍简介:

本书对无线局域网的安全体系结构理论与技术进行了比较全面的研究,内容包括WLAN安全体系结构框架、安全接入协议、快速切换安全协议、Mesh安全协议、认证密钥交换协议、WLAN匿名协议、自适应安全策略、性能评估、安全构件组合方法及可信WLAN安全体系结构等。

书籍目录:

1 Introduction

1.1 Overview

1.1.1 Architecture of WLAN

1.1.2 Transmission Technologies and Specifications

1.1.3 Series Specifications of IEEE 802.11

1.1.4 Applications

1.1.5 Development Trends

1.2 Key Issues of WLAN Security

1.2.1 Security Access

1.2.2 Fast roaming and handoff

1.2.3 Secure Integration of Heterogeneous Wireless Networks

1.2.4 Privacy Protection

1.2.5 WLAN Security Management

1.2.6 TPM-based Security Access

1.3 Realization

Questions and discussion

References

2 Security Architecture Framework

2.1 Security Attacks and Requirements

2.1.1 Logical Attacks

2.1.2 Physical Attacks

2.1.3 Security Requirements

2.2 Management-Based WLAN Security Architecture

2.2.1 The Design Methods of Security Architecture

2.2.2 Framework

2.2.3 Logical Realization of Key Components

2.2.4 Analysis

2.3 Evolution of Security Architecture for WLAN Access

2.3.1 WEP

2.3.2 IEEE 802.1X

2.3.3 WPA

2.3.4 IEEE 802.1 li Security Framework

2.3.5 WAPI

2.3.6 Others

2.4 The Integrated Security Access Authentication Architecture for

WLAN Terminals

2.4.1 Design Concepts

2.4.2 The Architecture Scheme

2.4.3 Flow of Integrated Authentication Operations

2.4.4 Prototype Implementation

Questions and Discussions

References

3 Security Access Protocol

3.1 Security Analysis of WAPI

3.1.1 WAPI Specification

3.1.2 WAPI Implementation Plan

3.1.3 Security Analysis of WAI in WAPI Implementation Plan...

3.1.4 Implementation Plan Overcomes the Weaknesses of the

Original WAPI

3.2 Analysis and Improvement of WAPI

3.2.1 Universally Composable Security

3.2.2 Improvement of WAPI

3.2.3 Analysis of Improved Protocol

3.3 Authentication Scheme that Compatible with 802.1 li and WAPI

3.3.1 Compatible Scheme

3.3.2 Security Analysis of Compatible Scheme

3.3.3 Compatibility Analysis of New Scheme

3.4 WAPI-XG1 Access Authentication and Fast Handoff Protocol

3.4.1 Overview

3.4.2 Authentication Protocol

3.4.3 Unicast Key Agreement Protocol

3.4.4 Group key notification protocol

3.4.5 Security Analysis

3.4.6 Improved Authentication and Fast Handoff Protocols

Based on WAPI-XG1

3.5 Self-Certified Public Key based WAPI Authentication and Key

Agreement Protocol

3.5.1 Authentication and Key Agreement Protocol

3.5.2 Authentication of Self-Certified Certificate and Key

Agreement at STA

3.5.3 Security Analysis

3.5.4 Protocol Features and Performance Analysis

Questions and discussion

Reference

4 Security Protocols for Fast BSS Transition

4.1 IEEE 802.11r

4.1.1 Introduction

4.1.2 Fast BSS Transition Protocol

4.1.3 Fast BSS Transition Flow

4.1.4 Security Consideration

4.2 Security Solution for IEEE 802.1 lr Drafts

4.2.1 MIC Authentication Based Solutions

4.2.2 Hash Chain Based FT Mechanism

4.2.3 Mechanism Analysis

4.3 FT Security Solution Based on Location

4.3.1 Proactive Neighbor Caching Mechanism Based on Moving

Direction and QoS Guarantee

4.3.2 Active Probing Algorithm Assisted by Location

4.3.3 Secure FT Solution Based on Location

Questions and discussion

References

5 Security Protocols in WLAN Mesh

5.1 Overview of WLAN Mesh

5.1.1 SnowMesh

5.1.2 SEE-Mesh

5.1.3 IEEE 802.11s Draft

5.1.4 Classification of Wireless Mesh Networks

5.1.5 Security Requirements of WLAN Mesh

5.2 WLAN Mesh Authentication Schemes

5.2.1 Centralized Authentication

5.2.2 Distributed Authentication

5.2.3 Pre-Shared Key Authentication

5.2.4 MSA

5.2.5 4-way Mesh Handshake

5.2.6 Identity-based Mesh Authentication Protocol

5.3 Protocols for Access Authentication, Secure Fast Handoff and

Roaming

5.3.1 Access Authentication Protocol

5.3.2 Security Analysis

5.3.3 Performance Analysis

5.4 Design and Implementation of Mesh Access Authentication System

5.4.1 Technological Foundations

5.4.2 Design and Implementation

Questions and discussion

Reference

6 Authenticated Key Exchange Protocol

7 Privacy Protection for WLAN

8 Adaptive Security Policy

9 Evaluation Method of Security Performance

10 Architecture of Trusted Terminal

11 Architecture of Trusted Network Connect

Index

内容摘要:

Security Access in Wireless Local Area Networks From Architecture andProtocols to Realization deals with the method and technology of the WLANsecurity architecture, design and analysis of security protocols for WLAN,and WLAN security management.The book is intended for researchers in wireless communication, electricaland computer engineering, and for graduate students.The authors are with Xidian University, P. R. China, where Dr. Jianfeng Mais a professor of computer science and the director of the Key Laboratory of Computer Networks and Information Security (Ministry of Education).

书籍规格:

书籍详细信息
书名无线局域网安全接入站内查询相似图书
丛书名信息安全系列丛书
9787040262100
如需购买下载《无线局域网安全接入》pdf扫描版电子书或查询更多相关信息,请直接复制isbn,搜索即可全网搜索该ISBN
出版地北京出版单位高等教育出版社
版次1版印次1
定价(元)58.0语种英文
尺寸24装帧精装
页数印数 1300

书籍信息归属:

无线局域网安全接入是高等教育出版社于2009.03出版的中图分类号为 TN925 的主题关于 无线电通信-局部网络-安全技术-英文 的书籍。