Security Access in Wireless Local Area Networks From Architecture andProtocols to Realization deals with the method and technology of the WLANsecurity architecture, design and analysis of security protocols for WLAN,and WLAN security management.The book is intended for researchers in wireless communication, electricaland computer engineering, and for graduate students.The authors are with Xidian University, P. R. China, where Dr. Jianfeng Mais a professor of computer science and the director of the Key Laboratory of Computer Networks and Information Security (Ministry of Education).
作者簡介
暫缺《無線局域網(wǎng)安全接入:體系結(jié)構(gòu)與協(xié)議》作者簡介
圖書目錄
1 Introduction 1.1 Overview 1.1.1 Architecture of WLAN 1.1.2 Transmission Technologies and Specifications 1.1.3 Series Specifications of IEEE 802.11 1.1.4 Applications 1.1.5 Development Trends 1.2 Key Issues of WLAN Security 1.2.1 Security Access 1.2.2 Fast roaming and handoff 1.2.3 Secure Integration of Heterogeneous Wireless Networks 1.2.4 Privacy Protection 1.2.5 WLAN Security Management 1.2.6 TPM-based Security Access 1.3 Realization Questions and discussion References 2 Security Architecture Framework 2.1 Security Attacks and Requirements 2.1.1 Logical Attacks 2.1.2 Physical Attacks 2.1.3 Security Requirements 2.2 Management-Based WLAN Security Architecture 2.2.1 The Design Methods of Security Architecture 2.2.2 Framework 2.2.3 Logical Realization of Key Components 2.2.4 Analysis 2.3 Evolution of Security Architecture for WLAN Access 2.3.1 WEP 2.3.2 IEEE 802.1X 2.3.3 WPA 2.3.4 IEEE 802.1 li Security Framework 2.3.5 WAPI 2.3.6 Others 2.4 The Integrated Security Access Authentication Architecture for WLAN Terminals 2.4.1 Design Concepts 2.4.2 The Architecture Scheme 2.4.3 Flow of Integrated Authentication Operations 2.4.4 Prototype Implementation Questions and Discussions References 3 Security Access Protocol 3.1 Security Analysis of WAPI 3.1.1 WAPI Specification 3.1.2 WAPI Implementation Plan 3.1.3 Security Analysis of WAI in WAPI Implementation Plan... 3.1.4 Implementation Plan Overcomes the Weaknesses of the Original WAPI 3.2 Analysis and Improvement of WAPI 3.2.1 Universally Composable Security 3.2.2 Improvement of WAPI 3.2.3 Analysis of Improved Protocol 3.3 Authentication Scheme that Compatible with 802.1 li and WAPI 3.3.1 Compatible Scheme 3.3.2 Security Analysis of Compatible Scheme 3.3.3 Compatibility Analysis of New Scheme 3.4 WAPI-XG1 Access Authentication and Fast Handoff Protocol 3.4.1 Overview 3.4.2 Authentication Protocol 3.4.3 Unicast Key Agreement Protocol 3.4.4 Group key notification protocol 3.4.5 Security Analysis 3.4.6 Improved Authentication and Fast Handoff Protocols Based on WAPI-XG1 3.5 Self-Certified Public Key based WAPI Authentication and Key Agreement Protocol 3.5.1 Authentication and Key Agreement Protocol 3.5.2 Authentication of Self-Certified Certificate and Key Agreement at STA 3.5.3 Security Analysis 3.5.4 Protocol Features and Performance Analysis Questions and discussion Reference 4 Security Protocols for Fast BSS Transition 4.1 IEEE 802.11r 4.1.1 Introduction 4.1.2 Fast BSS Transition Protocol 4.1.3 Fast BSS Transition Flow 4.1.4 Security Consideration 4.2 Security Solution for IEEE 802.1 lr Drafts 4.2.1 MIC Authentication Based Solutions 4.2.2 Hash Chain Based FT Mechanism 4.2.3 Mechanism Analysis 4.3 FT Security Solution Based on Location 4.3.1 Proactive Neighbor Caching Mechanism Based on Moving Direction and QoS Guarantee 4.3.2 Active Probing Algorithm Assisted by Location 4.3.3 Secure FT Solution Based on Location Questions and discussion References 5 Security Protocols in WLAN Mesh 5.1 Overview of WLAN Mesh 5.1.1 SnowMesh 5.1.2 SEE-Mesh 5.1.3 IEEE 802.11s Draft 5.1.4 Classification of Wireless Mesh Networks 5.1.5 Security Requirements of WLAN Mesh 5.2 WLAN Mesh Authentication Schemes 5.2.1 Centralized Authentication 5.2.2 Distributed Authentication 5.2.3 Pre-Shared Key Authentication 5.2.4 MSA 5.2.5 4-way Mesh Handshake 5.2.6 Identity-based Mesh Authentication Protocol 5.3 Protocols for Access Authentication, Secure Fast Handoff and Roaming 5.3.1 Access Authentication Protocol 5.3.2 Security Analysis 5.3.3 Performance Analysis 5.4 Design and Implementation of Mesh Access Authentication System 5.4.1 Technological Foundations 5.4.2 Design and Implementation Questions and discussion Reference 6 Authenticated Key Exchange Protocol 7 Privacy Protection for WLAN 8 Adaptive Security Policy 9 Evaluation Method of Security Performance 10 Architecture of Trusted Terminal 11 Architecture of Trusted Network Connect Index