注冊 | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當(dāng)前位置: 首頁出版圖書科學(xué)技術(shù)計(jì)算機(jī)/網(wǎng)絡(luò)網(wǎng)絡(luò)與數(shù)據(jù)通信網(wǎng)絡(luò)組建與管理無線局域網(wǎng)安全接入:體系結(jié)構(gòu)與協(xié)議

無線局域網(wǎng)安全接入:體系結(jié)構(gòu)與協(xié)議

無線局域網(wǎng)安全接入:體系結(jié)構(gòu)與協(xié)議

定 價:¥58.00

作 者: 馬建峰 等著
出版社: 高等教育出版社
叢編項(xiàng): 信息安全系列叢書
標(biāo) 簽: 網(wǎng)絡(luò)配置與管理

ISBN: 9787040262100 出版時間: 2009-04-01 包裝: 精裝
開本: 16開 頁數(shù): 431 字?jǐn)?shù):  

內(nèi)容簡介

  Security Access in Wireless Local Area Networks From Architecture andProtocols to Realization deals with the method and technology of the WLANsecurity architecture, design and analysis of security protocols for WLAN,and WLAN security management.The book is intended for researchers in wireless communication, electricaland computer engineering, and for graduate students.The authors are with Xidian University, P. R. China, where Dr. Jianfeng Mais a professor of computer science and the director of the Key Laboratory of Computer Networks and Information Security (Ministry of Education).

作者簡介

暫缺《無線局域網(wǎng)安全接入:體系結(jié)構(gòu)與協(xié)議》作者簡介

圖書目錄

1 Introduction
1.1 Overview
1.1.1 Architecture of WLAN
1.1.2 Transmission Technologies and Specifications
1.1.3 Series Specifications of IEEE 802.11
1.1.4 Applications
1.1.5 Development Trends
1.2 Key Issues of WLAN Security
1.2.1 Security Access
1.2.2 Fast roaming and handoff
1.2.3 Secure Integration of Heterogeneous Wireless Networks
1.2.4 Privacy Protection
1.2.5 WLAN Security Management
1.2.6 TPM-based Security Access
1.3 Realization
Questions and discussion
References
2 Security Architecture Framework
2.1 Security Attacks and Requirements
2.1.1 Logical Attacks
2.1.2 Physical Attacks
2.1.3 Security Requirements
2.2 Management-Based WLAN Security Architecture
2.2.1 The Design Methods of Security Architecture
2.2.2 Framework
2.2.3 Logical Realization of Key Components
2.2.4 Analysis
2.3 Evolution of Security Architecture for WLAN Access
2.3.1 WEP
2.3.2 IEEE 802.1X
2.3.3 WPA
2.3.4 IEEE 802.1 li Security Framework
2.3.5 WAPI
2.3.6 Others
2.4 The Integrated Security Access Authentication Architecture for
WLAN Terminals
2.4.1 Design Concepts
2.4.2 The Architecture Scheme
2.4.3 Flow of Integrated Authentication Operations
2.4.4 Prototype Implementation
Questions and Discussions
References
3 Security Access Protocol
3.1 Security Analysis of WAPI
3.1.1 WAPI Specification
3.1.2 WAPI Implementation Plan
3.1.3 Security Analysis of WAI in WAPI Implementation Plan...
3.1.4 Implementation Plan Overcomes the Weaknesses of the
Original WAPI
3.2 Analysis and Improvement of WAPI
3.2.1 Universally Composable Security
3.2.2 Improvement of WAPI
3.2.3 Analysis of Improved Protocol
3.3 Authentication Scheme that Compatible with 802.1 li and WAPI
3.3.1 Compatible Scheme
3.3.2 Security Analysis of Compatible Scheme
3.3.3 Compatibility Analysis of New Scheme
3.4 WAPI-XG1 Access Authentication and Fast Handoff Protocol
3.4.1 Overview
3.4.2 Authentication Protocol
3.4.3 Unicast Key Agreement Protocol
3.4.4 Group key notification protocol
3.4.5 Security Analysis
3.4.6 Improved Authentication and Fast Handoff Protocols
Based on WAPI-XG1
3.5 Self-Certified Public Key based WAPI Authentication and Key
Agreement Protocol
3.5.1 Authentication and Key Agreement Protocol
3.5.2 Authentication of Self-Certified Certificate and Key
Agreement at STA
3.5.3 Security Analysis
3.5.4 Protocol Features and Performance Analysis
Questions and discussion
Reference
4 Security Protocols for Fast BSS Transition
4.1 IEEE 802.11r
4.1.1 Introduction
4.1.2 Fast BSS Transition Protocol
4.1.3 Fast BSS Transition Flow
4.1.4 Security Consideration
4.2 Security Solution for IEEE 802.1 lr Drafts
4.2.1 MIC Authentication Based Solutions
4.2.2 Hash Chain Based FT Mechanism
4.2.3 Mechanism Analysis
4.3 FT Security Solution Based on Location
4.3.1 Proactive Neighbor Caching Mechanism Based on Moving
Direction and QoS Guarantee
4.3.2 Active Probing Algorithm Assisted by Location
4.3.3 Secure FT Solution Based on Location
Questions and discussion
References
5 Security Protocols in WLAN Mesh
5.1 Overview of WLAN Mesh
5.1.1 SnowMesh
5.1.2 SEE-Mesh
5.1.3 IEEE 802.11s Draft
5.1.4 Classification of Wireless Mesh Networks
5.1.5 Security Requirements of WLAN Mesh
5.2 WLAN Mesh Authentication Schemes
5.2.1 Centralized Authentication
5.2.2 Distributed Authentication
5.2.3 Pre-Shared Key Authentication
5.2.4 MSA
5.2.5 4-way Mesh Handshake
5.2.6 Identity-based Mesh Authentication Protocol
5.3 Protocols for Access Authentication, Secure Fast Handoff and
Roaming
5.3.1 Access Authentication Protocol
5.3.2 Security Analysis
5.3.3 Performance Analysis
5.4 Design and Implementation of Mesh Access Authentication System
5.4.1 Technological Foundations
5.4.2 Design and Implementation
Questions and discussion
Reference
6 Authenticated Key Exchange Protocol
7 Privacy Protection for WLAN
8 Adaptive Security Policy
9 Evaluation Method of Security Performance
10 Architecture of Trusted Terminal
11 Architecture of Trusted Network Connect
Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) m.ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號 鄂公網(wǎng)安備 42010302001612號