Wireless security models threats and solutions 1st Edition by Panos C Lekkas – Ebook PDF Instant Download/Delivery: 0071399437, 9780071399432
Full download Wireless security models threats and solutions 1st Edition after payment
Product details:
ISBN 10: 0071399437
ISBN 13: 9780071399432
Author: Panos C Lekkas
Wireless security models threats and solutions 1st Table of contents:
1 Why is Wireless Different?
Introduction
Protecting the Means Of Communication
Protecting Privacy
Promoting Safety
The Personal and the Public
Shaking Up the Status Quo
Understanding Wireless Forecasts
Reasonable Degrees of Security
Regulatory Environments and Issues
Security-Related Regulations
Security-Related Market Factors
Guidelines for Security Measures
Cellular Networks and Bearer Technologies
First-Generation Wireless (1G)
Second-Generation Wireless (2G)
Spread Spectrum
Code Division Multiple Access (CDMA)
Time Division Multiple Sccess (TDMA)
Global System for Mobile Communications (GSM)
Third-Generation Wireless (3G)
Short Message Service (SMS)
Fourth-Generation Wireless (4G)
Summary
Endnotes
2 Wireless Information Warfare
Wireless Is Information Warfare (IW)
A Functional Taxonomy Based on Information Warfare
Taxonomies of Wireless Communications Networks
A Classification Scheme Based on Network Architecture
Wireless Systems With a Fixed Supporting Infrastructure
Wireless Systems in Which Users Communicate Directly Through a Satellite or Satellites
Wireless Data Networks That Are Fully Mobile
Wireless Systems with No Supporting Infrastructure Other Than the Mobile Nodes Themselves
A Taxonomy Based on Mobility Only
Tethered Mobility with Fixed Base Stations
Fully Mobile Networks (“Comm on The Move”)
Circuit-Switched Networks and Packet-Switched Networks
Information Theory
Entropy
Mobile Capacity
Spectral Efficiency
Decision Theory
Risk Management and Architecture of Information Security (INFOSEC)
Thinking About Risk
Vulnerability
Threats
Countermeasures
Impact
A Model for Cost-Effective Risk Management
Historical Threats to Wireless Services OTA
Why Is Wireless Security Different?
Physical Layer Security
Data Link and Network Layers
Transport Layer Security
Application Layer Security
Performance Measures and Key Design Tradeoffs
High-Level Performance Measures
Low-Level Performance Measures
Military-Unique System Requirements
Offensive Information Operations
A Taxonomy of Attack Operations
Cryptographic Attacks
Defensive Information Operations
Cryptographic Measures
Key Management
Electromagnetic Capture Threats
Summary
Endnotes
3 Telephone System Vulnerabilities
Interception/Ease of Interception
Interruption of Service
Unintentional Interruptions
Natural Hazards
Hurricanes
Tornadoes
Winter storms
Flooding
Earthquakes
Fire
Power outages
Software failures
Intentional Interruptions
Phone Phreaking
Legal Aspects
Laws in the United States
Privacy
Cryptography
Jamming
Right to Free Speech and Privacy Expectations When Using Cell Phones
Who Is Doing The Intercepting?
Joe Q. Public
Mobile Telephones
Cellular Telephones
Friends and Neighbors: The Unintentional Intercept
Voice Systems
Data Systems
Criminal Arena
Fraud
Pagers
Drugs Cartels
Military—United States
Other Countries
ECHELON
ECHELON Ground Stations
Future Research
Law Enforcement
Applications
Cell Phone Vulnerabilities
Jamming
Interception
Countermeasures to Jamming and Interception
Code Division Multiple Access (CDMA)
Who’s Listening to Cell Phone Conversations?
Fraud
Countermeasures to Fraud
History of Cordless Telephones
Handset Features
Handset Vulnerabilities
Countermeasures
Microphones
Types of Microphones
Use of Microphones
Countermeasures
RF Data Communications
Short Range: < 100 Feet
Medium Range: 150 feet to 300 yards
Issue of Privacy
Summary
Endnotes
4 Satellite Communications
History
Satellite Orbits
Geostationary Orbit
Highly Elliptical Orbit
Low Earth Orbit/Medium Earth Orbit
Navigation and Tracking
Global Positioning System
Wide Area Augmentation System
Satellite Search and Rescue
Communications: Voice, Video, and Data
Voice
Video, Audio, and Data
Satellite Internet
Earth Sensing: Commercial Imaging
Landsat
SPOT
European Remote Sensing
IKONOS
Satellite Spectrum Issues
Instruments and Goals of Current U.S. Satellite Encryption Policy
Issues Associated With Current U.S. Policy
Federal Information Processing Standards
International Policy Concerns
Export Controls On Satellite Encryption: U.S. Objectives
Licensing and the U.S. Munitions List (USML)
Impact of Export Controls
Are Export Controls Effective?
Legal Issues for Satellite Encryption: Privacy
Computer crime
Surveillance
Patents
Public-Key Encryption for Satellite Communication
Escrowed Encryption for Satellite Communications
Impact on Information Security (INFOSEC) and Law Enforcement
Importance to the U.S. of Space Exploitation and Control
Deterrence
National and International Defense
Surveillance
Development, Implementation, and Management of Advanced Satellite Encryption Options and Strategies
Planning, Details, and Implementation
Options for Serving Data Consumers
Framework for Dealing With Policy Issues
Protection of Personal Data and Privacy
Security of Information Systems
Intellectual Property Protection
Demand for Hardware-Based Data Security
Balancing Information Technology, National Security, and Personal Privacy
State of the Revolution
The Pitfalls and the Potential
Information Vulnerability
Importance of Information
At Risk
Information Warfare
Summary
Endnotes
5 Cryptographic Security
Concealment
First Principles
Lock-and-Key Analogy
Transposition Ciphers
Substitution Ciphers
Kerckhoff’s Principles
Product Ciphers
Classical Cryptanalysis
Digital Cryptography
Pseudo-Random Number Generation
What Is Random?
Pseudo-Random Number Generator (PRNG)
The Seed and Entropy
Seed as Key?
The One-Time Pad
The Data Encryption Standard
Avalanche Effect
A Standard Under Fire -DES Isn’t Strong Anymore
Modern Cipher Breaking
Key Processing Rate
Brute Force Attacks
Standard Attacks
Advanced Attacks
Two Limits of Encryption
Block versus Stream Ciphers
Stream Cipher Design Considerations
The Stream Cipher Synchronization Problem
Non-Keyed Message Digests
SHA
SHA-1 in the Encryption Mode
HORNET™
Entropy Accumulator Description
Sync, Pad, and Data Encryption Key (DEK) Generation
Advanced Encryption Standard
Key Management-Generation and Distribution of Keys
Public-Key Systems-The Second Revolution
Public-Key Distribution and Diffie-Hellman
Digital Signatures
Certificate Authorities
Using Public-Key Cryptography for Key Management
Algorithms
Difficulty of Mathematical Systems
Integer Factorization Systems
Security
Implementation
Discrete Logarithm Systems
Security
Implementation
The Elliptic Curve Cryptosystem (ECC)
Security
Implementation
Comparison of Public-Key Cryptographic Systems
Efficiency
Computational overheads
Key Size Comparison
Bandwidth
ECDLP and Wireless Devices
Key Generation in Wireless Devices for IFP, DLP, and ECDLP
Bandwidth in Wireless Devices
Scalability
Processing Overhead
Smart cards
Cellular Phone Networks
Handheld Computers/Personal Digital Assistant (PDAs)
BSAFE Crypto-C
Cryptography in Embedded Hardware: FPGA and ASICs
FPGA Overview
FPGA-Based Cryptography
Results
Summary
Endnotes
6 Speech Cryptology
It Started with SIGSALY
Vetterlein’s Forschungsstelle
Digitizing Voice Information via SIGSALY
Overview of SIGSALY Encryption Process for Single Vocoder Channel
Cryptology of Speech Signals
Speech: Production and Nonlinguistic Properties
The Structure of Language
Phonemes and Phones
Historical Linguistics
Threads
Writing Systems
Classic Source-Filter Model
General Source-Filter Model
Continuous Speech Spectrogram
Sampling of the Speech Waveform
The Fourier Transform
The Fast Fourier Transform (FFT)
Windowing Signal Segments
Window Function
Linear Prediction Modeling
Quantization and PCM
Transmission of Speech Signals
Synchronization
Cryptography of Speech Signals
Analog Scramblers
Frequency Inverters
Band Splitters
Two-Band-Splitter
Band-Shifter
Band-Inverter
Bandshift-Inverter
n-Band-Splitter
Transform Based Scramblers (TBSs)
Time Domain Scramblers (TDSs)
Time Element Scrambling
Hopping Window
Sliding Window
Two-Dimensional Scramblers
Digital Scramblers
Source Coding of Speech
Formant Vocoder
Channel Vocoder
Linear Prediction Based Vocoder (LP)
Reflection Coefficients
Log Area Ratio Coefficients
Sinusoidal Model
Sinusoidal Parameter Analysis
Standards
Cryptanalysis of Speech Systems
Tools and Parameters for Cryptanalysis of Speech
Application of Sound Spectrograph to Cryptanalysis
Analog Methods
Cryptanalysis of Digital Scramblers/Ciphers
Noise Cancellation
Cryptanalysis of Linear Prediction Based Vocoders
Thoughts About Cryptanalysis of Public-Key Systems
Cryptanalysis of A5 Algorithm
Summary
Endnotes
7 The Wireless Local Area Network (WLAN)
Wireless Transmission Media
Infrared Systems
Narrowband Radio Systems
Wideband Radio Systems: Spread Spectrum
Frequency-Hopping Spread Spectrum (FHSS)
Direct-Sequence Spread Spectrum (DSSS)
WLAN Products and Standards—Today’s Leaders?
802.11 Security?
IEEE 802.11b
Securing WLANs
Eavesdropping
Unauthorized Access
Interference and Jamming
Physical Threats
Countermeasures
Frequency-Hopping Spread Spectrum (FHSS)
Direct-Sequence Spread Spectrum (DSSS)
Infrared (IR)
Narrowband
The Infamous WEP
Encryption
Authentication
Wired Equivalency Protocol Flaws Too Public
Other Authentication Techniques
Physical Security
Summary
Endnotes
8 Wireless Application Protocol(WAP)
Comparison of the TCP/IP, OSI, and WAP Models
How WAP Works
The Security Status of WAP
Viruses
Authorization
Non-repudiation
Authentication
Secure Sessions
Security Products
Securant Technologies™ ClearTrust Control
WAP Security Architecture
Marginal Security
Wireless Access to the Internet
Wireless Middleware
Summary
Endnotes
9 Wireless Transport Layer Security (WTLS)
Secure Socket Layer
Record Protocol
SSL Handshake Protocol
Transport Layer Security
Advantages and Disadvantages of SSL/TLS
Netscape
Microsoft
Entrust
EAP-TLS
Alternatives to SSL/TLS
IP Security (IPSec)
Authentication Header Protocol (AH)
Encapsulating Security Payload (ESP)
Transport and Tunnel Modes
Secure Shell (SSH)
SSH Transport Layer Protocol
SSH Versus TLS Implementations
Light Extensible Authentication Protocol (LEAP)
Wireless Transport Layer Security and WAP
Understanding Wireless Transport Layer Security
WTLS Handshake Protocol
WTLS Alert Protocol
WTLS Change Cipher Protocol
Pros and Cons of WTLS
WTLS Vulnerabilities
Implementations of WTLS
Additional Sources
Endnotes
10 Bluetooth
Bluetooth Basic Specifications
Bluetooth Technology
Bluetooth Specification Development
Design Decisions
Piconets
Bluetooth Security Architecture
Scatternets
The Bluetooth stack
Security Functions at the Baseband Layer
Security Functions of the Service Discovery Protocol
Security Functions at the Link Layer
Frequency-Hopping
Channel Establishment
Security Manager
Authentication
Authentication with the SAFER1 Block Cipher
Encryption
Encryption Modes
Key Length Negotiation
Encryption With the E0 Stream Cipher
Threats to Bluetooth Security
Jamming
Bluetooth holes
Summary and Security Assessment
Endnotes
11 Voice Over Internet Protocol
VoIP Generally Speaking
The Buzz Around VoIP
VoIP Standards
The Rise of VoIP Technology
Network Traffic
Billing and Interoperability Dilemma
Interoperability
Competitive Long Distance Rates
Caution: Implementation Ahead
The Vendor Market
Technical Issues for VoIP Calling
Speech Encoding
Voice Network Security Vulnerabilities
Confidentiality, Integrity, and Availability Attributes
VoIP and the Wireless Security Environment
Private Networks
WEP
Confidentiality, Integrity, and Availability in VoIP Implementations
IP Spoofing and VoIP
Interception and Eavesdropping of Voice Transmission Over the Air
Denial of Service
Summary
Endnotes
12 Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications
Taxonomy of Communications Systems
Client-Server versus Peer-to-Peer
Circuit-Switched versus Packet-Switched or Frame-Switched Communications
Unicast versus Broadcast Communications
Land-Based versus Wireless-Based Communications
Transmission Medium (Non-LAN Point-to-Point, LAN or WAN, or LAN-WAN-LAN)
Transmission Nature: Voice versus Data (Audio, Video, Alphanumeric)
Quantity, Speed, and Predictability of Transmitted Information
Protocol Sensitive Communications Security
Evolution Towards Wireless (HW and SW Avenues)
Encryptor Structures in Wireless
Interception and Vulnerability of Wireless Systems
Communications ESM and Interception Receivers
CVR
IFM
YIG-Tuned Narrowband Superheterodyne
YIG-Tuned Wideband Superheterodyne
Spectral Analyzer ESM Receiver
Channelized Receiver
Compressive Receiver
Acousto-Optical Bragg Cell Receiver
SAW Technology
Direct-Sequence Spread-Spectrum Systems Interception
Frequency-Hopping Systems Interception
Modulation Recognition and Comint System Output Processing
Decision Theoretical Approach
Analog-Modulated Signals
Digitally modulated signals
Neural-Network-Based Approach
Implications
Advanced Mobile Phone Services (AMPS)
Time Division Multiple Access (TDMA) IS-136
GSM
Wideband and narrowband CDMA
Covert Transmission
Conclusions
Endnotes
13 Optimizing Wireless Security with FPGAs and ASICs
Optimizing? Yes, But What?
The ‘Trust Nobody’ Design Mentality
Evaluating Secure Design Architectures
‘Weasel’ Model Philosophy and Rationale
A Case Study
Software vs. Hardware Implementation of Wireless Security
Configurable versus Non-Configurable Hardware
Configurable Logic Blocks
Distributed Arithmetic
FPGA vs. ASIC Approach in the Design Trade-Offs: A Business Context
On-Chip Modules Provide Wireless Communications Security
Required Modules in a Block-Cipher-Based COMSEC Chip
Basic Architectures for Block-Cipher Crypto Engines in a COMSEC Chip
Transmission Comparison of Cryptographic Modes of Operation
Security Considerations for the Modes During Transmission
Recovery Properties for Garbled and Dropped Bits
Block Size and Communications Protocol
Comparison Matrix for Performance Optimization
Basic Architectures for Block-Cipher Crypto Engines in a COMSEC Chip
Comparison of the Block-Cipher Implementation Architectures
Required Modules in a Stream-Cipher Based COMSEC Chip
Protection Against Catalog Attacks
Protection Against Power Analysis Attacks
Protection Against Traffic Analysis Attacks
Common Techniques for Implementing Security Modules
Initialization Vectors and Random Number Generation
The Case of Stream Ciphers
Embedded Generation of Random Numbers
LFSR- and Linear Congruence-Based Schemes
User-Initiated Information Collection
Nonlinear Diode-Based RNG
Ambient Noise-Based RNG
Sampling White Noise
Chaotic Processing-Based RNG
Intel’s Embedded RNG Source
IBM Embedded RNG Source
Other Designs
Binary Number Multiplication and Accumulation Engine
Modular Arithmetic Unit and Exponentiation Engine
Hashing
Diffie-Hellman (DH) Key Exchange
Elliptic-Curve-Cryptography-Based Diffie-Hellman and Digital Signatures
Hyperelliptic Curves
NTRU Lattice Cryptography Engine
NTRU Key Generation
NTRU-Based Encryption
NTRU-Based Decryption
Other Alternative Techniques
RPK Key Protocol
Secure Repacketization of Information
Kasumi Algorithm
Hardware-Efficient Rijndael Implementations and Comparison with Alternative Technologies
Power Consumption versus Performance
Software Implementations of Rijndael in an SOC
Comparing Rijndael with HORNET™ and DES/3DES in Embedded SW
Implementation of Rijndael on Configurable Hardware
Full-Custom VLSI Hardware Implementations
Authentication in Third-Generation Handsets
People also search for Wireless security models threats and solutions 1st:
wireless security models threats and solutions pdf
wireless network security issues and solutions
a wireless security protocol to protect wi-fi networks
wireless threats and vulnerabilities
a wireless security standard quizlet
Tags:
Panos C Lekkas,Wireless security



