注册 | 登录读书好,好读书,读好书!
读书网-DuShu.com
当前位置: 首页出版图书科学技术计算机/网络网络与数据通信网络组建与管理无线局域网安全接入:体系结构与协议

无线局域网安全接入:体系结构与协议

无线局域网安全接入:体系结构与协议

定 价:¥58.00

作 者: 马建峰 等著
出版社: 高等教育出版社
丛编项: 信息安全系列丛书
标 签: 网络配置与管理

购买这本书可以去


ISBN: 9787040262100 出版时间: 2009-04-01 包装: 精装
开本: 16开 页数: 431 字数:  

内容简介

  Security Access in Wireless Local Area Networks From Architecture andProtocols to Realization deals with the method and technology of the WLANsecurity architecture, design and analysis of security protocols for WLAN,and WLAN security management.The book is intended for researchers in wireless communication, electricaland computer engineering, and for graduate students.The authors are with Xidian University, P. R. China, where Dr. Jianfeng Mais a professor of computer science and the director of the Key Laboratory of Computer Networks and Information Security (Ministry of Education).

作者简介

暂缺《无线局域网安全接入:体系结构与协议》作者简介

图书目录

1 Introduction
1.1 Overview
1.1.1 Architecture of WLAN
1.1.2 Transmission Technologies and Specifications
1.1.3 Series Specifications of IEEE 802.11
1.1.4 Applications
1.1.5 Development Trends
1.2 Key Issues of WLAN Security
1.2.1 Security Access
1.2.2 Fast roaming and handoff
1.2.3 Secure Integration of Heterogeneous Wireless Networks
1.2.4 Privacy Protection
1.2.5 WLAN Security Management
1.2.6 TPM-based Security Access
1.3 Realization
Questions and discussion
References
2 Security Architecture Framework
2.1 Security Attacks and Requirements
2.1.1 Logical Attacks
2.1.2 Physical Attacks
2.1.3 Security Requirements
2.2 Management-Based WLAN Security Architecture
2.2.1 The Design Methods of Security Architecture
2.2.2 Framework
2.2.3 Logical Realization of Key Components
2.2.4 Analysis
2.3 Evolution of Security Architecture for WLAN Access
2.3.1 WEP
2.3.2 IEEE 802.1X
2.3.3 WPA
2.3.4 IEEE 802.1 li Security Framework
2.3.5 WAPI
2.3.6 Others
2.4 The Integrated Security Access Authentication Architecture for
WLAN Terminals
2.4.1 Design Concepts
2.4.2 The Architecture Scheme
2.4.3 Flow of Integrated Authentication Operations
2.4.4 Prototype Implementation
Questions and Discussions
References
3 Security Access Protocol
3.1 Security Analysis of WAPI
3.1.1 WAPI Specification
3.1.2 WAPI Implementation Plan
3.1.3 Security Analysis of WAI in WAPI Implementation Plan...
3.1.4 Implementation Plan Overcomes the Weaknesses of the
Original WAPI
3.2 Analysis and Improvement of WAPI
3.2.1 Universally Composable Security
3.2.2 Improvement of WAPI
3.2.3 Analysis of Improved Protocol
3.3 Authentication Scheme that Compatible with 802.1 li and WAPI
3.3.1 Compatible Scheme
3.3.2 Security Analysis of Compatible Scheme
3.3.3 Compatibility Analysis of New Scheme
3.4 WAPI-XG1 Access Authentication and Fast Handoff Protocol
3.4.1 Overview
3.4.2 Authentication Protocol
3.4.3 Unicast Key Agreement Protocol
3.4.4 Group key notification protocol
3.4.5 Security Analysis
3.4.6 Improved Authentication and Fast Handoff Protocols
Based on WAPI-XG1
3.5 Self-Certified Public Key based WAPI Authentication and Key
Agreement Protocol
3.5.1 Authentication and Key Agreement Protocol
3.5.2 Authentication of Self-Certified Certificate and Key
Agreement at STA
3.5.3 Security Analysis
3.5.4 Protocol Features and Performance Analysis
Questions and discussion
Reference
4 Security Protocols for Fast BSS Transition
4.1 IEEE 802.11r
4.1.1 Introduction
4.1.2 Fast BSS Transition Protocol
4.1.3 Fast BSS Transition Flow
4.1.4 Security Consideration
4.2 Security Solution for IEEE 802.1 lr Drafts
4.2.1 MIC Authentication Based Solutions
4.2.2 Hash Chain Based FT Mechanism
4.2.3 Mechanism Analysis
4.3 FT Security Solution Based on Location
4.3.1 Proactive Neighbor Caching Mechanism Based on Moving
Direction and QoS Guarantee
4.3.2 Active Probing Algorithm Assisted by Location
4.3.3 Secure FT Solution Based on Location
Questions and discussion
References
5 Security Protocols in WLAN Mesh
5.1 Overview of WLAN Mesh
5.1.1 SnowMesh
5.1.2 SEE-Mesh
5.1.3 IEEE 802.11s Draft
5.1.4 Classification of Wireless Mesh Networks
5.1.5 Security Requirements of WLAN Mesh
5.2 WLAN Mesh Authentication Schemes
5.2.1 Centralized Authentication
5.2.2 Distributed Authentication
5.2.3 Pre-Shared Key Authentication
5.2.4 MSA
5.2.5 4-way Mesh Handshake
5.2.6 Identity-based Mesh Authentication Protocol
5.3 Protocols for Access Authentication, Secure Fast Handoff and
Roaming
5.3.1 Access Authentication Protocol
5.3.2 Security Analysis
5.3.3 Performance Analysis
5.4 Design and Implementation of Mesh Access Authentication System
5.4.1 Technological Foundations
5.4.2 Design and Implementation
Questions and discussion
Reference
6 Authenticated Key Exchange Protocol
7 Privacy Protection for WLAN
8 Adaptive Security Policy
9 Evaluation Method of Security Performance
10 Architecture of Trusted Terminal
11 Architecture of Trusted Network Connect
Index

本目录推荐