ebook img

Wireless Communications Security (Artech House Universal Personal Communications) PDF

192 Pages·2005·2.27 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Wireless Communications Security (Artech House Universal Personal Communications)

Wireless Communications Security For a complete listing of the Artech House Universal Personal Communications Series, turn to the back of this book. Wireless Communications Security Hideki Imai Mohammad Ghulam Rahman Kazukuni Kobara ar techhouse . com Library of Congress Cataloging-in-Publication Data Imai, Hideki, 1943– Wireless communications security/Hideki Imai, Mohammad Ghulam Rahman, Kazukuni Kobara. p. cm. — (universal personal communications) Includes bibliographical references and index. ISBN 1-58053-520-8 (alk. paper) 1. Wireless communication systems—Security measures. 2. Mobile communica- tion systems—Security measures. I. Rahman, Mohammad Ghulam. II. Kobara, Kazukuni. III. Title IV. Artech House universal personal communications series. TK5103.2.I43 2005 621.384—dc22 2005053075 British Library Cataloguing in Publication Data Wireless communications security. — (Artech House universal personal communications series) 1. Wireless communication system—Security measures I. Imai, Hideki, 1943– II. Rahman, Mohammad Ghulam III. Kobara, Kazukuni 621.3’82 ISBN-10: 1-58053-520-8 Cover design by Igor Valdman © 2006 ARTECH HOUSE, INC. 685 Canton Street Norwood, MA 02062 All rights reserved. Printed and bound in the United States of America. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Artech House cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. International Standard Book Number: 1-58053-520-8 10 9 8 7 6 5 4 3 2 1 Contents Preface xi 1 Introduction 1 2 Cryptography 5 2.1 Introduction 5 2.2 Basic Concepts 5 2.2.1 Ciphertext and Plaintext 5 2.2.2 Types of Cryptosystems 6 2.2.3 Goals of a Cryptosystem 7 2.2.4 Security 8 2.3 Symmetric Encryption Schemes 9 2.4 Perfect Secrecy: The One-Time Pad 9 2.5 Block Ciphers 11 2.5.1 Permutation 11 2.5.2 Substitution 12 2.5.3 Diffusion/Confusion 13 2.5.4 SP Networks 14 2.5.5 Basic Structure 14 v vi Wireless Communications Security 2.5.6 Modes of Use 15 2.5.7 DES 17 2.5.8 AES 18 2.6 Stream Ciphers 19 2.6.1 Advantages 20 2.6.2 Security Remarks 20 2.6.3 Some Examples 21 2.7 Asymmetric Cryptosystems and Digital Signatures 21 2.7.1 Public-Key Encryption 22 2.7.2 Public Key Infrastructure (PKI) and Certificate Authorities (CA) 23 2.7.3 Mathematical Background 25 2.7.4 Diffie-Hellman Key Agreement 27 2.7.5 RSA Cryptosystem 28 2.7.6 ElGamal Cryptosystem 29 2.7.7 Necessary Security for Practical Public Key Encryption Systems 31 2.7.8 Digital Signature 32 2.7.9 Mathematical Background 33 2.7.10 RSA Signature Scheme 35 2.7.11 Digital Signature Algorithm (DSA) 36 2.7.12 Necessary Security for Practical Digital Signature Systems 36 References 38 3 Security Features in Wireless Environment 41 3.1 Introduction 41 3.2 Mobile Network Environment 42 3.3 General Security Threats of a Network 44 3.4 Limitations of Mobile Environment 45 3.5 Mobility and Security 46 Contents vii 3.6 Attacks in Mobile Environment 46 3.6.1 Nuisance Attack 47 3.6.2 Impersonation Attack 48 3.6.3 Interception Attack 48 3.6.4 Replay Attack 48 3.6.5 Parallel Session Attack 48 3.7 Security Issues in Mobile Environment 49 3.7.1 Authentication 49 3.7.2 Anonymity 50 3.7.3 Device Vulnerability 52 3.7.4 Domain Boundary Crossing 52 References 53 4 Standard Protocols 55 4.1 IEEE 802.11 55 4.1.1 Brief History 55 4.1.2 IEEE802.11 Architecture 56 4.1.3 IEEE 802.11 Layers 60 4.1.4 Security of IEEE 802.11 62 4.1.5 Key Management 69 4.1.6 Weaknesses of WEP 70 4.2 Bluetooth 72 4.2.1 Bluetooth Overview 72 4.2.2 Brief History 73 4.2.3 Benefits 74 4.2.4 Bluetooth Architecture and Components 76 4.2.5 Security of Bluetooth 78 4.2.6 Problems in the Security of Bluetooth 89 Reference 90 5 Security in 2G Systems 91 5.1 GSM System 92 5.1.1 Introduction 92 viii Wireless Communications Security 5.1.2 Architecture of the GSM Network 93 5.1.3 GSM Security Features 96 5.1.4 Attacks on GSM Security 103 5.2 I-mode Introduction 106 5.2.1 Introduction 106 5.2.2 I-mode System Overview 107 5.2.3 SSL Overview 108 5.2.4 Protocol Stack 110 5.2.5 HTTP Tunneling Protocol 114 5.2.6 Postscript 116 5.3 CDPD 116 5.3.1 Introduction 116 5.3.2 Basic Idea 118 5.3.3 Basic Infrastructure 119 5.3.4 How a CDPD Connection Works 122 5.3.5 CDPD Security 125 References 129 6 Security in 3G and 4G Systems 131 6.1 3G Wireless Communications Systems 131 6.2 Third Generation Partnership Project (3GPP) 133 6.2.1 3GPP Security Objectives 133 6.3 3G Security Architecture 134 6.3.1 Network Access Security 135 6.3.2 Network Domain Security 136 6.3.3 User Domain Security 136 6.3.4 Provider-User Link Security 136 6.3.5 Visibility and Configurability of Security 137 6.4 Authentication and Key Agreement (AKA) in 3GPP 137 6.5 Confidentiality and Integrity 138 6.5.1 Confidentiality 139 Contents ix 6.5.2 Data Integrity 140 6.6 4G Wireless Communications Systems 141 References 142 7 Wireless Application Protocol (WAP) 143 7.1 Introduction 143 7.2 WAP Protocol Stack 144 7.3 WAP PKI Model 147 7.3.1 WTLS Class 2 148 7.3.2 WTLS Class 3 and SignText 152 7.4 Cipher Suite in WTLS 156 7.4.1 Key Exchange Suite 156 7.4.2 Elliptic Curve Parameters in WTLS 160 7.4.3 Bulk Encryption and MAC Suite 161 7.5 WAP-Profiled TLS 163 7.5.1 Cipher Suites 164 7.5.2 Session ID and Session Resume 167 7.5.3 Server/Client Authentication and Certificate 168 7.5.4 TLS Tunneling 168 7.6 WAP Identity Module 169 7.7 Further Information 170 References 171 About the Authors 175 Index 177

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.