文件名称:Wireless Internet Security_ Architecture and Protocols.pdf
文件大小:1.88MB
文件格式:PDF
更新时间:2022-09-03 05:18:25
Wireless Internet Security Architecture Protocols
Preface pagevii Acknowledgements x 1 Securitybasics 1 1.1Importanceofathreatanalysis 2 1.2Classesofthreats 5 1.3Classesofsecurityservices 8 1.4Supportingsecuritysystems 10 1.5Summary 19 2 Networksystemarchitecturebasics 21 2.1Theroleofarchitectureinnetworksystemstandardization 21 2.2Thefunctionalarchitectureapproach 23 2.3Examplefunctionalarchitectureforasimplewirelesssystem 26 2.4Functionalarchitecturefornetworksecuritysystems 28 2.5Examplefunctionalarchitectureforawirelesssecuritysystem 30 2.6Summary 34 3 Cryptographicalgorithmsandsecurityprimitives 35 3.1Replayprotectionalgorithms 36 3.2Messagedigestsandcryptographichashfunctions 37 3.3Sharedkeyencryption 42 3.4Publickeyalgorithms 48 3.5Keyprovisioning 51 3.6Summary 55 4 WirelessIPnetworkaccesscontrol 57 4.1Wirelessnetworkusagemodels 58 4.2Threatstowirelessnetworkaccess 59 4.3Functionalarchitecturefornetworkaccesscontrol 60 4.4Subscription-baseddesign 72 vi Contents 4.5Hotspotdesign 85 4.6Summary 91 5 LocalIPsubnetconfigurationandaddressresolutionsecurity 93 5.1ImpactoftheIProutingandaddressingarchitectureonmobility 93 5.2ReviewoflocalIPsubnetconfigurationandaddressresolutionprotocols 96 5.3ThreatstolocalIPsubnetconfigurationandaddressresolution 103 5.4FunctionalarchitectureforlocalIPsubnetconfigurationandaddress resolutionsecurity 106 5.5Securityprotocolsforaddressresolution,addressautoconfiguration,and routerdiscovery 113 5.6SecurityprotocolsforLocalSubnetConfigurationServeraccess 125 5.7Summary 128 6 SecurityforglobalIPmobility 130 6.1ReviewofIPmobilityarchitectureandprotocols 131 6.2ThreatstoMobileIPsecurity 135 6.3FunctionalarchitectureforMobileIPsecurity 138 6.4TheIPSecurity(IPsec)protocol 147 6.5Returnroutability 162 6.6Thelimitsofsecurityarchitectures:theexampleofMobileIP 166 6.7Summary 167 7 Locationprivacy 169 7.1Threatsagainstprivacyandlocationprivacy 170 7.2SecurityprotocolsforprivacyinIPcommunication 172 7.3SecurityprotocolsforlocationprivacyinthewirelessInternet 176 7.4Anarchitecturalapproachtolocationprivacy 181 7.5Summary 197 References 199 Index 202