Wireless Network Security: Communication Technology

Wireless Network Security: Communication Technology

Xuemin Shen, Ding-Zhu Du, Yang Ziao

Language: English

Pages: 420

ISBN: 2:00183691

Format: PDF / Kindle (mobi) / ePub


This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

security level of AES is 2128,192,256 depending on the used key size, where the AES block sizes are 128, 192, and 256. 3. RC4 Stream Cipher [16] RC4 is a contemporary variable key-size stream cipher with byte-oriented operations. It is based on the use of a random permutation. Key length is in a range from 1 to 256 bytes. RC4 is easy to be implemented even on resource-constraint devices, such as Berkeley Motes and smart cards. Adjustment of key length can achieve a tradeoff between running speed

Internet. In this way, all heavy computations could be shifted from the very constrained devices to the more powerful ones and thus asymmetric schemes could become feasible. For this reason, the model is attractive for sensor networks. It needs to be analyzed for particular applications if it is reasonable to assume that higher layers can be accessed by all sensor networks at any time. When Stajano and Anderson [23] were among the first to consider the special properties of ad hoc networks, they

maximize their own throughput. Neighbors should monitor these misbehaviors. Although it is still an open challenge to prevent selfishness, some schemes have been proposed, such as ERA-802.11 [12], where detection algorithms are proposed. Traffic analysis is prevented by encryption at data link layer. WEP encryption scheme defined in the IEEE 802.11 wireless LAN standard uses link encryption to hide the end-to-end traffic flow information. However, WEP has been widely criticized for its weaknesses [28]

possible value for the digit size g. If added by itself, this buffer would add a cycle of latency to the multiplier’s performance time. This extra cycle is compensated for by bypassing the P (x) register and driving the multiplier’s output with the output of the 3-operand mod2 adder. It is important to note that the delay of the 3-operand mod2 adder is being merged with the delay of the bus which connects the multiplier to the rest of the design. In this case the relatively relaxed bus timing has

under attack. If a user has totally random behavior, for example, the movement of a taxi driver, it will be very difficult, if not impossible, to create his normal movement profile. Our mobility-based detection algorithm alone is not suitable for such kind of users. Based on these considerations, our research is not motivated to build a system to accurately detect all intrusions. Instead, we aim at providing an optional service to end users as well as a useful administration tool to service

Download sample

Download