Security in Fixed and Wireless Networks

Author: Guenter Schaefer  

Publisher: John Wiley & Sons Inc‎

Publication year: 2016

E-ISBN: 9781119040767

P-ISBN(Paperback): 9781119040743

P-ISBN(Hardback):  9781119040743

Subject: TP309 安全保密

Keyword: network security
cryptography
secure communication
wireless networks

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what mechanisms and protocols can be deployed to counter these risks, and how these mechanisms and protocols work.

 

Chapter

1.4 Information Security Measures

1.5 Important Terms Relating to Communication Security

Chapter 2 Fundamentals of Cryptology

2.1 Cryptology, Cryptography and Cryptanalysis

2.2 Classification of Cryptographic Algorithms

2.3 Cryptanalysis

2.4 Estimating the Effort Needed for Cryptographic Analysis

2.5 Characteristics and Classification of Encryption Algorithms

2.6 Key Management

2.7 Summary

2.8 Supplemental Reading

2.9 Questions

Chapter 3 Symmetric Cryptography

3.1 Encryption Modes of Block Ciphers

3.2 Data Encryption Standard

3.3 Advanced Encryption Standard

3.4 RC4 Algorithm

3.5 The KASUMI algorithm

3.6 Summary

3.7 Supplemental Reading

3.8 Questions

Chapter 4 Asymmetric Cryptography

4.1 Basic Idea of Asymmetric Cryptography

4.2 Mathematical Principles

4.3 The RSA Algorithm

4.4 The Problem of the Discrete Logarithm

4.5 The Diffie-Hellman Key Exchange Algorithm

4.6 The ElGamal Algorithm

4.7 Security of Conventional Asymmetric Cryptographic Schemes

4.8 Principles of Cryptography Based on Elliptic Curves

4.8.1 Elliptic Curves over R

4.8.2 Elliptic Curves over Zp

4.8.3 Elliptic Curves over GF(2n)

4.8.4 Cryptographic Protocols Based on Elliptic Curves

4.8.5 Security of cryptographic techniques over elliptic curves

4.8.6 Current Developments in EC Cryptography

4.9 Summary

4.10 Supplemental Reading

4.11 Questions

Chapter 5 Cryptographic Check Values

5.1 Requirements and Classification

5.2 Modification Detection Codes

5.2.1 Attacks on Modification Detection Codes

5.2.2 General Structure of Cryptographic Hash Functions

5.2.3 MD5

5.2.4 SHA-1

5.2.5 The SHA-2 Family

5.2.6 SHA-3

5.3 Message Authentication Codes

5.3.1 Schemes for the Computation of Message Authentication Codes

5.3.2 Security of CBC-based Algorithms

5.3.3 The CMAC Method

5.4 Message Authentication Codes Based on MDCs

5.5 Authenticated Encryption

5.5.1 The Galois/Counter Mode (GCM)

5.5.2 The SpongeWrap Method

5.6 Summary

5.7 Supplemental Reading

5.8 Questions

Chapter 6 Random Number Generation

6.1 Random Numbers and Pseudo-Random Numbers

6.2 Cryptographically Secure Random Numbers

6.3 Statistical Tests for Random Numbers

6.4 Generation of Random Numbers

6.5 Generating Secure Pseudo-Random Numbers

6.6 Implementation Security

6.7 Summary

6.8 Supplemental Reading

6.9 Questions

Chapter 7 Cryptographic Protocols

7.1 Properties and Notation of Cryptographic Protocols

7.2 Data Origin and Entity Authentication

7.3 Needham-Schroeder Protocol

7.4 Kerberos

7.5 International Standard X.509

7.5.1 X.509 Key Certificates

7.5.2 Direct Authentication Protocols Based on X.509

7.6 Security of Negotiated Session Keys

7.7 Advanced Password Authentication Methods

7.8 Formal Validation of Cryptographic Protocols

7.8.1 Classification of Formal Validation Methods

7.8.2 GNY Logic*

7.8.3 An Example of GNY Logic*

7.9 Summary

7.10 Supplemental Reading

7.11 Questions

Chapter 8 Secure Group Communication*

8.1 Specific Requirements for Secure Group Communication

8.2 Negotiation of Group Keys

8.2.1 Centralised Key Management

8.2.2 Decentralised Key Management

8.2.3 Distributed Key Management

Group Diffie-Hellman

Tree-Based Group Diffie-Hellman

8.3 Source Authentication

8.3.1 Block-by-block Authentication

8.3.2 Combinatorial Selection of Symmetric MACs

8.3.3 TESLA

8.4 Summary

8.5 Supplemental Reading

8.6 Questions

Chapter 9 Access Control

9.1 Definition of Terms and Concepts

9.2 Security Labels

9.3 Specification of Access Control Policies

9.4 Categories of Access Control Mechanisms

9.5 Summary

9.6 Supplemental Reading

9.7 Questions

Part II Network Security

Chapter 10 Integration of Security Services in Communication Architectures

10.1 Motivation

10.2 A Pragmatic Model

10.3 General Considerations for the Placement of Security Services

10.4 Integration in Lower Protocol Layers vs Applications

10.5 Integration into End Systems or Intermediate Systems

10.6 Summary

10.7 Supplemental Reading

10.8 Questions

Chapter 11 Link Layer Security Protocols

11.1 Virtual Separation of Data Traffic with IEEE 802.1Q

11.2 Securing a Local Network Infrastructure Using IEEE 802.1X

11.3 Encryption of Data Traffic with IEEE 802.1AE

11.4 Point-to-Point Protocol

11.4.1 Structure and Frame Formats

11.4.2 PPP Authentication Protocols

11.4.3 PPP Encryption

11.5 Point-to-Point Tunneling Protocol

11.5.1 Basic Versions of PPTP Packet Encapsulation

11.5.2 Development of PPTP and Alternative Approaches

11.6 Virtual Private Networks

11.7 Summary

11.8 Supplemental Reading

11.9 Questions

Chapter 12 IPsec Security Architecture

12.1 Short Introduction to the Internet Protocol Suite

12.2 Overview of the IPsec Architecture

12.3 Use of Transport and Tunnel Modes

12.4 IPsec Protocol Processing

12.5 The ESP Protocol

12.6 The AH Protocol

12.7 The ISAKMP Protocol

12.8 Internet Key Exchange Version 1

12.8.1 Negotiation of an ISAKMP-SA

12.8.2 Negotiation of IPsec SAs

12.9 Internet Key Exchange Version 2

12.10 Other Aspects of IPsec

12.10.1 Interaction with Compression

12.10.2 Interaction with Firewalls and Intrusion Detection Systems

12.10.3 Handling of Network Address Translation

12.11 Summary

12.12 Supplemental Reading

12.13 Questions

Chapter 13 Transport Layer Security Protocols

13.1 Secure Socket Layer

13.1.1 Security Services and Protocol Architecture

13.1.2 The Record Protocol

13.1.3 The Handshake Protocol

13.1.4 Authentication and Negotiation of Session Keys

13.1.5 A Shortcoming in the Handshake Protocol

13.2 Transport Layer Security

13.2.1 Cryptographic Algorithms used in TLS

13.2.2 Attacks on Selectable Initialisation Vectors

13.2.3 Renegotiation Attack

13.2.4 Problems with Compression in TLS

13.2.5 Timing Attacks on the CBC Mode in TLS

13.3 Datagram Transport Layer Security

13.4 Secure Shell

13.4.1 SSH Transport Protocol

13.4.2 Parameter Negotiation and Server Authentication

13.4.3 Client Authentication

13.4.4 Connection Control Within A Session

13.5 Summary

13.6 Supplemental Reading

13.7 Questions

Part III Secure Wireless and Mobile Communications

Chapter 14 Security Aspects of Mobile Communication

14.1 Threats in Mobile Communication Networks

14.2 Protecting Location Confidentiality

14.2.1 Broadcast Communication

14.2.2 Temporary Pseudonyms

14.2.3 Communication Mixes

14.3 Summary

14.4 Supplemental Reading

14.5 Questions

Chapter 15 Security in Wireless Local Area Networks

15.1 The IEEE 802.11 Standard for WLANs

15.2 Entity Authentication

15.2.1 Shared Key Authentication

15.2.2 Simultaneous Authentication of Equals

15.3 Wired Equivalent Privacy

15.3.1 Operation and Linearity of CRC

15.3.2 Operation of the WEP Protocol

15.3.3 Flaws in the WEP Protocol

15.4 Robust Secure Networks

15.4.1 Temporal Key Integrity Protocol

15.4.2 CTR with CBC-MAC Protocol

15.5 Security in Public WLANs

15.6 Summary

15.7 Supplemental Reading

15.8 Questions

Chapter 16 Security in Mobile Wide-Area Networks

16.1 Global System for Mobile Communication

16.2 Universal Mobile Telecommunications System

16.3 Long-Term Evolution

16.4 Summary

16.5 Supplemental Reading

16.6 Questions

Part IV Protecting Communications Infrastructures

Chapter 17 Protecting Communications and Infrastructure in Open Networks

17.1 Systematic Threat Analysis

17.2 Security of End Systems

17.2.1 Buffer Overflows

17.2.2 Format String Attacks

17.2.3 Exploiting Race Conditions and Confidence in the Operating System Environment

17.2.4 SQL Injections and Cross-site Scripting

17.2.5 Malware

17.3 Summary

17.4 Supplemental Reading

17.5 Questions

Chapter 18 Availability of Data Transport

18.1 Denial-of-Service Attacks

18.1.1 Denial-of-Service Attacks with Permanent Effects

Permanent Destruction and Reservation of Resources

Illegitimate Resource Reservation

18.1.2 Resource Exhaustion

Memory Exhaustion Attacks

Exhaustion of Computing Resources

Bandwidth Exhaustion

18.2 Distributed Denial-of-Service Attacks

18.3 Countermeasures

18.3.1 Cookies and Stateless Protocol Design

18.3.2 Client Puzzles

18.3.3 Filtering, Partitioning and Redundancy

18.3.4 IP Traceback*

Logging of Packets in Gateway Systems

Reconstruction of Network Paths by the Receiver

Conclusion Regarding IP Traceback

18.4 Summary

18.5 Supplemental Reading

18.6 Questions

Chapter 19 Routing Security

19.1 Cryptographic Protection of BGP

19.1.1 Authentication of Data Transmission

19.1.2 The Secure Border Gateway Protocol

19.1.3 The Secure Origin Border Gateway Protocol

19.1.4 Interdomain Route Validation

19.1.5 BGPSEC and the Resource Public Key Infrastructure

19.2 Identification of Routing Anomalies*

19.2.1 Geographic Filtering

19.2.2 Temporary Withholding of Unknown Routes

19.2.3 Automated Revocation of Illegitimate Routes

19.3 Summary

19.4 Supplemental Reading

19.5 Questions

Chapter 20 Secure Name Resolution

20.1 The DNS Operating Principle

20.2 Security Objectives and Threats

20.3 Secure Use of Traditional DNS

20.4 Cryptographic Protection of DNS

20.4.1 TSIG

20.4.2 DNSSEC

Resource Records of DNSSEC

Security Discussion

20.4.3 DNSCurve*

The DNSCurve Operating Principle

Security and Functionality Implications

20.4.4 Distributed Name Resolution*

Peer Name Resolution Protocol

GNU Name System

20.5 Summary

20.6 Supplemental Reading

20.7 Questions

Chapter 21 Internet Firewalls

21.1 Tasks and Basic Principles of Firewalls

21.2 Firewall-Relevant Internet Services and Protocols

21.3 Terminology and Building Blocks

21.4 Firewall Architectures

21.5 Packet Filtering

21.6 Bastion Hosts and Proxy Servers

21.7 Other Aspects of Modern Firewall Systems

21.8 Summary

21.9 Supplemental Reading

21.10 Questions

Chapter 22 Automated Attack Detection and Response

22.1 Operating Principle and Objectives of Intrusion Detection Systems

22.2 Design and operation of network-based IDSs

22.2.1 Signature-based Identification

22.2.2 Detection of Deviations from Defined Behaviour Models

22.2.3 Self-learning Systems for Anomaly Detection

22.3 Response to Attacks and Automatic prevention

22.4 Techniques for Evading NIDSs

22.5 Summary

22.6 Supplemental Reading

22.7 Questions

Chapter 23 Management of Complex Communication Infrastructures*

23.1 Automatic Certificate Management

23.1.1 Mirroring of Certificate Revocation Lists

23.1.2 Online Certificate Status Protocol

23.1.3 Server-based Certificate Validation Protocol

23.1.4 Simple Certificate Enrollment Protocol

23.1.5 Certificate Management over CMS

23.1.6 Enrollment over Secure Transport

23.1.7 Certificate Management Protocol

23.2 Automatic VPN Configuration

23.2.1 Centralised Distribution of VPN Policies

23.2.2 Group Encrypted Transport VPN

23.2.3 DNSSEC-based VPN

23.2.4 Dynamic Multipoint VPN and FlexVPN

23.2.5 Tunnel Endpoint Discovery

23.2.6 Proactive Multicast-Based IPSEC Discovery Protocol

23.2.7 Secure Overlay for IPsec Discovery

23.3 Summary

23.4 Supplemental Reading

23.5 Questions

Bibliography

Abbreviations

Index

EULA

The users who browse this book also browse


No browse record.