Handbook of Research on Wireless Security, 1st Edition

  • Published By:
  • ISBN-10: 1599049007
  • ISBN-13: 9781599049007
  • Grade Level Range: College Freshman - College Senior
  • 789 Pages | eBook
  • Original Copyright 2008 | Published/Released May 2008
  • This publication's content originally published in print form: 2008

  • Price:  Sign in for price

About

Overview

Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to society.

The Handbook of Research on Wireless Security combines research from over 100 esteemed experts from 23 countries on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security. As an innovative and current reference source for students, educators, faculty members, researchers, engineers in the field of wireless security, this handbook will make an invaluable addition to any library collection.

Key Features:

  • 49 authoritative contributions by over 100 of the world’s leading experts in wireless security from 23 countries
  • Comprehensive coverage of each specific topic, highlighting recent trends and describing the latest advances in the field
  • More than 1,400 references to existing literature and research on wireless security
  • A compendium of over 400 key terms with detailed definitions
  • Organized by topic and indexed, making it a convenient method of reference for all IT/IS scholars and professionals
  • Cross-referencing of key terms, figures, and information pertinent to wireless security

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Editorial Advisory Board.
Table of Contents.
Detailed Table of Contents.
Preface.
Acknowledgment.
1: Security Fundamentals.
2: Malicious Software in Mobile Devices.
3: Secure Service Discovery.
4: Security of Mobile Code.
5: Identity Management.
6: Wireless Wardriving.
7: Intrusion and Anomaly Detection in Wireless Networks.
8: Peer-to-Peer (P2P) Network Security: Firewall Issues.
9: Identity Management for Wireless Service Access.
10: Privacy-Enhancing Technique: A Survey and Classification.
11: Vulnerability Analysis and Defenses in Wireless Networks.
12: Key Distribution and Management for Mobile Applications.
13: Architecture and Protocols for Authentication, Authorization, and Accounting in the Future Wireless Communications Networks.
14: Authentication, Authorisation, and Access Control in Mobile Systems.
15: Trustworthy Networks, Authentication, Privacy, and Security Models.
16: The Provably Secure Formal Methods for Authentication and Key Agreement Protocols.
17: Multimedia Encryption and Watermarking in Wireless Environment.
18: System-on-Chip Design of the Whirlpool Hash Function.
19: Security in 3G/B3G/4G.
20: Security in 4G.
21: Security Architectures for B3G Mobile Networks.
22: Security in UMTS 3G Mobile Networks.
23: Access Security in UMTS and IMS.
24: Security in 2.5G Mobile Systems.
25: End-to-End Security Comparisons Between IEEE 802.16e and 3G Technologies.
26: Generic Application Security in Current and Future Networks.
27: Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments.