Preface |
|
xvii | |
Acknowledgments |
|
xxiii | |
About the Companion Website |
|
xxv | |
Part I Introduction and Mathematics Background |
|
1 | (50) |
|
|
3 | (10) |
|
1.1 General Computer Communication Network Architecture |
|
|
3 | (2) |
|
1.1.1 Wired Communication Network Infrastructure |
|
|
3 | (1) |
|
1.1.2 Wireless Communication Network Infrastructure |
|
|
4 | (1) |
|
1.2 Different Types of Wireless Communication Systems |
|
|
5 | (4) |
|
1.2.1 Classification of Wireless Communication Systems |
|
|
5 | (2) |
|
1.2.1.1 Based on Coverage |
|
|
5 | (1) |
|
1.2.1.2 Based on Topology |
|
|
6 | (1) |
|
1.2.1.3 Based on Mobility |
|
|
6 | (1) |
|
1.2.2 Wireless Personal Area Networks |
|
|
7 | (1) |
|
1.2.3 Wireless Local Area Networks |
|
|
7 | (1) |
|
1.2.4 Wireless Wide Area Networks |
|
|
7 | (2) |
|
1.3 Network Security and Wireless Security |
|
|
9 | (2) |
|
|
9 | (1) |
|
1.3.2 Security Threats in Wireless Networks |
|
|
10 | (1) |
|
|
11 | (2) |
|
2 Basic Network Security Concepts |
|
|
13 | (14) |
|
|
13 | (3) |
|
|
13 | (2) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (5) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
19 | (2) |
|
|
21 | (3) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
2.3.6 Traffic Padding and Routing Control |
|
|
23 | (1) |
|
|
24 | (1) |
|
2.4 Other Security Concepts |
|
|
24 | (1) |
|
|
24 | (1) |
|
2.4.2 Cryptographic Protocols |
|
|
25 | (1) |
|
|
25 | (2) |
|
3 Mathematical Background |
|
|
27 | (24) |
|
3.1 Basic Concepts in Modern Algebra and Number Theory |
|
|
27 | (3) |
|
|
27 | (2) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
3.2 Prime Numbers, Modular Arithmetic, and Divisors |
|
|
30 | (4) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
31 | (2) |
|
3.2.4 Multiplicative Inverse |
|
|
33 | (1) |
|
3.3 Finite Field and Galois Field |
|
|
34 | (1) |
|
3.4 Polynomial Arithmetic |
|
|
35 | (6) |
|
3.4.1 Ordinary Polynomial Arithmetic |
|
|
35 | (1) |
|
3.4.2 Polynomial Arithmetic in Finite Fields |
|
|
36 | (1) |
|
3.4.3 Modular Polynomial Arithmetic |
|
|
37 | (2) |
|
3.4.4 Computational Considerations |
|
|
39 | (1) |
|
3.4.5 Generating a Finite Field with a Generator |
|
|
40 | (1) |
|
3.5 Fermat's Little Theorem, Euler's Totient Function, and Euler's Theorem |
|
|
41 | (3) |
|
3.5.1 Fermat's Little Theorem |
|
|
41 | (1) |
|
3.5.2 Euler Totient Function φ(n) |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
44 | (2) |
|
3.7 Chinese Remainder Theorem |
|
|
46 | (2) |
|
|
48 | (1) |
|
|
49 | (2) |
Part II Cryptographic Systems |
|
51 | (78) |
|
4 Cryptographic Techniques |
|
|
53 | (24) |
|
|
53 | (1) |
|
4.2 Classical Cryptographic Schemes |
|
|
53 | (9) |
|
4.2.1 Classical Substitution Ciphers |
|
|
54 | (6) |
|
|
54 | (1) |
|
4.2.1.2 Monoalphabetic Cipher |
|
|
55 | (2) |
|
|
57 | (1) |
|
4.2.1.4 Polyalphabetic Cipher |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
4.2.2 Classical Transposition Ciphers |
|
|
60 | (1) |
|
4.2.2.1 Rail Fence Cipher |
|
|
60 | (1) |
|
4.2.2.2 Row Transposition Cipher |
|
|
60 | (1) |
|
|
61 | (1) |
|
4.2.3 More Advanced Classical Ciphers |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (4) |
|
4.4.1 Overview of Modern Block Ciphers |
|
|
63 | (1) |
|
4.4.2 Feistel Block Cipher |
|
|
64 | (3) |
|
4.4.2.1 Ideal Block Cipher |
|
|
64 | (1) |
|
4.4.2.2 Feistel Cipher Structure |
|
|
65 | (2) |
|
4.4.3 Block Cipher Design |
|
|
67 | (1) |
|
4.5 Data Encryption Standards (DES) |
|
|
67 | (9) |
|
|
67 | (1) |
|
4.5.2 Initial Permutation (IP) |
|
|
68 | (1) |
|
|
69 | (3) |
|
|
71 | (1) |
|
4.5.3.2 DES Permutation Function |
|
|
72 | (1) |
|
|
72 | (2) |
|
|
74 | (1) |
|
4.5.6 Multiple Encryption and DES |
|
|
75 | (1) |
|
|
76 | (1) |
|
5 More on Cryptographic Techniques |
|
|
77 | (24) |
|
5.1 Advanced Encryption Standards |
|
|
77 | (8) |
|
5.1.1 The AES Cipher: Rijndael |
|
|
77 | (1) |
|
|
77 | (2) |
|
5.1.3 Details in Each Round |
|
|
79 | (6) |
|
|
79 | (2) |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
5.1.3.5 AES Key Expansion |
|
|
82 | (2) |
|
|
84 | (1) |
|
5.1.3.7 AES Implementation Aspects |
|
|
84 | (1) |
|
5.2 Block Cipher Modes of Operation |
|
|
85 | (7) |
|
5.2.1 Electronic Codebook (ECB) Mode |
|
|
85 | (1) |
|
5.2.2 Cipher Block Chaining (CBC) Mode |
|
|
86 | (1) |
|
5.2.3 Cipher Feedback (CFB) Mode |
|
|
87 | (1) |
|
5.2.4 Output Feedback (OFB) Mode |
|
|
88 | (1) |
|
5.2.5 The Counter (CTR) Mode |
|
|
89 | (1) |
|
5.2.6 Last Block in Different Modes |
|
|
90 | (1) |
|
|
90 | (2) |
|
5.3 Public Key Infrastructure |
|
|
92 | (3) |
|
5.3.1 Basics of Public Key Cryptography |
|
|
92 | (2) |
|
5.3.2 Public-Key Applications |
|
|
94 | (1) |
|
5.3.3 Security of Public Key Schemes |
|
|
94 | (1) |
|
|
95 | (2) |
|
|
95 | (1) |
|
5.4.2 RSA Encryption and Decryption |
|
|
96 | (1) |
|
5.4.3 RSA Security Analysis |
|
|
96 | (1) |
|
5.4.3.1 Factoring Problem |
|
|
97 | (1) |
|
|
97 | (1) |
|
5.4.3.3 Chosen Ciphertext Attacks |
|
|
97 | (1) |
|
5.5 Diffie-Hellman (D-H) Key Exchange |
|
|
97 | (2) |
|
5.5.1 Finite-Field Diffie-Hellman |
|
|
97 | (1) |
|
5.5.2 Elliptic-Curve Diffie-Hellman |
|
|
98 | (1) |
|
5.5.3 Diffie-Hellman Key Exchange Vulnerability |
|
|
98 | (1) |
|
|
99 | (2) |
|
6 Message Authentication, Digital Signature, and Key Management |
|
|
101 | (28) |
|
6.1 Message Authentication |
|
|
101 | (4) |
|
6.1.1 Message Authentication Functions |
|
|
101 | (1) |
|
6.1.2 Message Authentication Code |
|
|
102 | (1) |
|
|
103 | (1) |
|
6.1.4 Size of MAC and Hash Value |
|
|
104 | (1) |
|
6.2 MAC and Hash Algorithms |
|
|
105 | (9) |
|
6.2.1 Data Authentication Algorithm |
|
|
105 | (1) |
|
6.2.2 A Basic Hash Function Structure |
|
|
106 | (1) |
|
6.2.3 Secure Hash Algorithm (SHA) |
|
|
106 | (1) |
|
|
107 | (4) |
|
6.2.4.1 SHA-512 Compression Function |
|
|
108 | (1) |
|
6.2.4.2 SHA-512 Round Function |
|
|
109 | (2) |
|
|
111 | (1) |
|
6.2.6 Other MAC Functions |
|
|
112 | (2) |
|
6.2.6.1 Keyed Hash Functions as MACs |
|
|
112 | (1) |
|
|
113 | (1) |
|
6.3 Digital Signature and Authentication |
|
|
114 | (8) |
|
6.3.1 Digital Signature Properties |
|
|
115 | (1) |
|
6.3.2 Digital Signature Standard and Algorithm |
|
|
116 | (1) |
|
6.3.3 The Elliptic Curve Digital Signature Algorithm |
|
|
117 | (3) |
|
6.3.3.1 ECDSA Domain Parameters |
|
|
117 | (1) |
|
6.3.3.2 ECDSA Private/Public Keys |
|
|
118 | (1) |
|
6.3.3.3 ECDSA Digital Signature Generation |
|
|
119 | (1) |
|
6.3.3.4 ECDSA Digital Signature Verification |
|
|
120 | (1) |
|
6.3.4 Authentication Protocols |
|
|
120 | (2) |
|
|
122 | (6) |
|
6.4.1 Key Distribution with Symmetric Key Encryption |
|
|
122 | (1) |
|
6.4.2 Symmetric Key Distribution Using Public Key Cryptosystems |
|
|
123 | (1) |
|
6.4.3 Distribution of Public Keys |
|
|
124 | (2) |
|
6.4.4 Public Key Infrastructure |
|
|
126 | (1) |
|
6.4.5 X.509 Authentication Service |
|
|
126 | (2) |
|
|
128 | (1) |
Part III Security for Wireless Local Area Networks |
|
129 | (78) |
|
|
131 | (22) |
|
|
131 | (2) |
|
7.1.1 Wi-Fi Operating Modes |
|
|
131 | (1) |
|
7.1.2 Challenges in WLAN Security |
|
|
132 | (1) |
|
7.1.3 Tricks that Fail to Protect WLAN |
|
|
133 | (1) |
|
7.2 Evolution of WLAN Security |
|
|
133 | (2) |
|
7.3 Wired Equivalent Privacy |
|
|
135 | (5) |
|
|
135 | (1) |
|
7.3.2 WEP Integrity and Confidentiality |
|
|
136 | (1) |
|
|
136 | (1) |
|
7.3.4 WEP Security Problems |
|
|
137 | (3) |
|
7.3.4.1 Problems in WEP Access Control |
|
|
138 | (1) |
|
7.3.4.2 Problems in WEP Integrity |
|
|
138 | (1) |
|
7.3.4.3 Problems in WEP Confidentiality |
|
|
138 | (1) |
|
7.3.4.4 Problems in WEP Key Management |
|
|
139 | (1) |
|
7.3.5 Possible WEP Security Enhancement |
|
|
140 | (1) |
|
7.4 IEEE 802.1X Authentication Model |
|
|
140 | (3) |
|
7.4.1 An Overview of IEEE 802.1X |
|
|
140 | (1) |
|
7.4.2 Protocols in IEEE 802.1X |
|
|
141 | (2) |
|
7.4.3 Mapping the IEEE 802.1X model to WLAN |
|
|
143 | (1) |
|
7.5 IEEE 802.11i Standard |
|
|
143 | (7) |
|
7.5.1 Overview of IEEE 802.11i |
|
|
143 | (1) |
|
7.5.2 IEEE 802.11i Access Control |
|
|
143 | (2) |
|
7.5.3 IEEE 802.1i Key Management |
|
|
145 | (2) |
|
7.5.4 IEEE 802.11i Integrity and Confidentiality |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (2) |
|
7.5.6 Weakness in 802.11i |
|
|
150 | (1) |
|
7.6 Wi-Fi Protected Access 3 and Opportunistic Wireless Encryption |
|
|
150 | (2) |
|
|
150 | (1) |
|
|
150 | (1) |
|
7.6.3 Opportunistic Wireless Encryption |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
153 | (24) |
|
8.1 Introduction to Bluetooth |
|
|
153 | (4) |
|
8.1.1 Overview of Bluetooth Technology |
|
|
153 | (1) |
|
8.1.2 Bluetooth Vulnerabilities and Threats |
|
|
154 | (2) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
8.1.3 Bluetooth Security Services and Security Modes |
|
|
156 | (1) |
|
8.1.3.1 Bluetooth Security Services |
|
|
156 | (1) |
|
8.1.3.2 Bluetooth Security Modes |
|
|
156 | (1) |
|
|
157 | (6) |
|
8.2.1 Link Key Generation for Security Modes 2 and 3 |
|
|
157 | (1) |
|
8.2.2 Link Key Generation for Security Mode 4 |
|
|
158 | (1) |
|
8.2.3 Association Model in Mode 4 |
|
|
159 | (4) |
|
8.2.3.1 Numeric comparison |
|
|
159 | (1) |
|
8.2.3.2 Out-of-Band (OOB) |
|
|
160 | (2) |
|
|
162 | (1) |
|
8.3 Authentication, Confidentiality, and Trust and Service Levels |
|
|
163 | (3) |
|
|
163 | (1) |
|
|
164 | (1) |
|
8.3.3 Trust and Security Service Levels |
|
|
165 | (1) |
|
8.4 Cryptographic Functions for Security Modes 1, 2, and 3 |
|
|
166 | (7) |
|
|
166 | (2) |
|
8.4.1.1 Overview of the SAFER+ Structure |
|
|
166 | (1) |
|
8.4.1.2 SAFER+ Round Function |
|
|
166 | (2) |
|
8.4.1.3 SAFER+ Key Schedule for 128-Bit Key |
|
|
168 | (1) |
|
|
168 | (2) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (2) |
|
8.5 Cryptographic Functions in Security Mode 4 (SSP) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (3) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
174 | (3) |
|
|
177 | (16) |
|
9.1 Introduction to Zigbee |
|
|
177 | (2) |
|
|
177 | (1) |
|
9.1.2 Security Threats Against Zigbee |
|
|
178 | (1) |
|
9.2 IEEE 802.15.4 Security Features |
|
|
179 | (3) |
|
|
179 | (1) |
|
9.2.2 IEEE 802.15.4 Frame Structure |
|
|
180 | (2) |
|
9.3 Zigbee Upper Layer Security |
|
|
182 | (5) |
|
9.3.1 Zigbee Security Models |
|
|
182 | (1) |
|
9.3.2 Security Keys in Zigbee |
|
|
183 | (1) |
|
9.3.3 Zigbee Network Layer Security |
|
|
184 | (1) |
|
9.3.4 Zigbee Application Support Layer Security |
|
|
184 | (1) |
|
9.3.5 Other Security Features in Zigbee |
|
|
185 | (2) |
|
9.4 Security-Related MAC PIB Attributes |
|
|
187 | (1) |
|
9.5 Mechanisms Used in Zigbee Security |
|
|
188 | (3) |
|
|
188 | (1) |
|
|
189 | (1) |
|
9.5.3 Overview of the AES-CCM |
|
|
189 | (1) |
|
9.5.4 Nonces Applied to the Security Mechanisms |
|
|
189 | (1) |
|
9.5.5 Matyas-Meyer-Oseas Hash Function |
|
|
190 | (1) |
|
|
191 | (2) |
|
|
193 | (14) |
|
10.1 Introduction to RFID |
|
|
193 | (2) |
|
10.1.1 Overview of RFID Subsystems |
|
|
193 | (1) |
|
10.1.2 Types of RFID Tags |
|
|
193 | (1) |
|
|
194 | (1) |
|
10.1.4 RFID Frequency Bands |
|
|
194 | (1) |
|
10.2 Security Attacks, Risks, and Objectives of RFID Systems |
|
|
195 | (1) |
|
10.2.1 Security Attacks to RFID Systems |
|
|
195 | (1) |
|
10.2.2 RFID Privacy Risks |
|
|
195 | (1) |
|
10.2.3 Security Objectives |
|
|
196 | (1) |
|
10.3 Mitigation Strategies and Countermeasures for RFID Security Risks |
|
|
196 | (3) |
|
10.3.1 Cryptographic Strategies |
|
|
196 | (1) |
|
|
196 | (1) |
|
10.3.1.2 One-Way Hash Locks |
|
|
196 | (1) |
|
|
197 | (1) |
|
10.3.2 Anti-Collision Algorithms |
|
|
197 | (1) |
|
|
197 | (1) |
|
10.3.2.2 The Selective Blocker Tag |
|
|
197 | (1) |
|
10.3.3 Other Mitigation Strategies |
|
|
198 | (1) |
|
10.3.3.1 Physical Shielding Sleeve (The Faraday Cage) |
|
|
198 | (1) |
|
10.3.3.2 Secure Reader Protocol 1.0 |
|
|
198 | (1) |
|
10.4 RFID Security Mechanisms |
|
|
199 | (6) |
|
|
199 | (1) |
|
10.4.1.1 Default Hash Locking |
|
|
199 | (1) |
|
10.4.1.2 Randomized Hash Locking |
|
|
200 | (1) |
|
10.4.2 HB Protocol and the Enhancement |
|
|
200 | (9) |
|
|
200 | (2) |
|
|
202 | (1) |
|
|
203 | (2) |
|
|
205 | (2) |
Part IV Security for Wireless Wide Area Networks |
|
207 | (72) |
|
|
209 | (20) |
|
11.1 GSM System Architecture |
|
|
209 | (3) |
|
|
209 | (1) |
|
11.1.2 Base Station Subsystem |
|
|
210 | (1) |
|
|
211 | (1) |
|
11.2 GSM Network Access Security Features |
|
|
212 | (3) |
|
11.2.1 GSM Entity Authentication |
|
|
212 | (2) |
|
11.2.2 GSM Confidentiality |
|
|
214 | (1) |
|
|
215 | (1) |
|
11.2.4 Detection of Stolen/Compromised Equipment in GSM |
|
|
215 | (1) |
|
11.3 GSM Security Algorithms |
|
|
215 | (10) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
216 | (4) |
|
|
220 | (5) |
|
|
220 | (3) |
|
|
223 | (2) |
|
11.4 Attacks Against GSM Security |
|
|
225 | (2) |
|
11.4.1 Attacks Against GSM Authenticity |
|
|
225 | (2) |
|
11.4.1.1 Attacks Against GSM Confidentiality |
|
|
226 | (1) |
|
11.4.2 Other Attacks against GSM Security |
|
|
227 | (1) |
|
11.5 Possible GSM Security Improvements |
|
|
227 | (1) |
|
11.5.1 Improvement over Authenticity and Anonymity |
|
|
227 | (1) |
|
11.5.2 Improvement over Confidentiality |
|
|
228 | (1) |
|
11.5.3 Improvement of the Signaling Network |
|
|
228 | (1) |
|
|
228 | (1) |
|
|
229 | (22) |
|
12.1 UMTS System Architecture |
|
|
229 | (2) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
231 | (1) |
|
12.2 UMTS Security Features |
|
|
231 | (1) |
|
12.3 UMTS Network Access Security |
|
|
232 | (8) |
|
12.3.1 Authentication and Key Agreement |
|
|
232 | (5) |
|
12.3.1.1 The AKA Mechanism |
|
|
232 | (2) |
|
12.3.1.2 Authentication Vector Generation |
|
|
234 | (2) |
|
12.3.1.3 AKA on the UE Side |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
238 | (1) |
|
12.3.4 User Identity Confidentiality |
|
|
239 | (1) |
|
12.4 Algorithms in Access Security |
|
|
240 | (9) |
|
12.4.1 Encryption Algorithm f8 |
|
|
240 | (2) |
|
12.4.1.1 Integrity Algorithm f9 |
|
|
241 | (1) |
|
12.4.2 Description of KASUMI |
|
|
242 | (6) |
|
12.4.2.1 An Overview of KASUMI Algorithm |
|
|
242 | (2) |
|
12.4.2.2 Round Function Fi(·) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
12.4.2.6 S-boxes S7 and S9 |
|
|
245 | (2) |
|
|
247 | (1) |
|
12.4.3 Implementation and Operational Considerations |
|
|
248 | (1) |
|
12.5 Other UMTS Security Features |
|
|
249 | (1) |
|
12.5.1 Mobile Equipment Identification |
|
|
249 | (1) |
|
|
249 | (1) |
|
12.5.3 User-to-USIM Authentication |
|
|
249 | (1) |
|
|
250 | (1) |
|
|
251 | (28) |
|
13.1 LTE System Architecture |
|
|
251 | (2) |
|
13.2 LTE Security Architecture |
|
|
253 | (2) |
|
|
255 | (6) |
|
|
255 | (2) |
|
13.3.2 LTE Authentication and Key Agreement |
|
|
257 | (1) |
|
13.3.3 Signaling Protection |
|
|
258 | (1) |
|
13.3.3.1 Protection of Radio-Specific Signaling |
|
|
259 | (1) |
|
13.3.3.2 Protection of User-Plane Traffic |
|
|
259 | (1) |
|
13.3.4 Overview of Confidentiality and Integrity Algorithms |
|
|
259 | (2) |
|
13.3.4.1 Confidentiality Mechanism |
|
|
259 | (1) |
|
13.3.4.2 Integrity Mechanism |
|
|
260 | (1) |
|
|
261 | (1) |
|
13.4 Handover Between eNBs |
|
|
261 | (7) |
|
|
261 | (1) |
|
13.4.2 Key Handling in Handover |
|
|
262 | (6) |
|
|
262 | (2) |
|
13.4.2.2 Intra-eNB Key Handling |
|
|
264 | (1) |
|
13.4.2.3 Intra-MME Key Handling |
|
|
265 | (1) |
|
13.4.2.4 Inter-MME Key Handling |
|
|
266 | (2) |
|
|
268 | (5) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
270 | (1) |
|
|
271 | (2) |
|
13.6 Security for Interworking Between LTE and Legacy Systems |
|
|
273 | (5) |
|
13.6.1 Between LTE and UMTS |
|
|
273 | (4) |
|
13.6.1.1 Idle Mode Mobility from E-UTRAN to UTRAN |
|
|
273 | (1) |
|
13.6.1.2 Idle Mode Mobility from UTRAN to E-UTRAN |
|
|
274 | (1) |
|
13.6.1.3 Handover Mode from E-UTRAN to UTRAN |
|
|
275 | (1) |
|
13.6.1.4 Handover Mode from UTRAN to E-UTRAN |
|
|
276 | (1) |
|
13.6.2 Between E-UTRAN and GERAN |
|
|
277 | (4) |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
278 | (1) |
Part V Security for Next Generation Wireless Networks |
|
279 | (54) |
|
14 Security in 5G Wireless Networks |
|
|
281 | (30) |
|
14.1 Introduction to 5G Wireless Network Systems |
|
|
281 | (2) |
|
14.1.1 The Advancement of 5G |
|
|
281 | (1) |
|
14.1.2 5G Wireless Network Systems |
|
|
282 | (1) |
|
14.2 5G Security Requirements and Major Drives |
|
|
283 | (4) |
|
14.2.1 Security Requirements for 5G Wireless Networks |
|
|
283 | (1) |
|
14.2.2 Major Drives for 5G Wireless Security |
|
|
284 | (2) |
|
14.2.2.1 Supreme Built-in-Security |
|
|
284 | (1) |
|
14.2.2.2 Flexible Security Mechanisms |
|
|
285 | (1) |
|
|
285 | (1) |
|
14.2.3 Attacks in 5G Wireless Networks |
|
|
286 | (1) |
|
14.2.3.1 Eavesdropping and Traffic Analysis |
|
|
286 | (1) |
|
|
286 | (1) |
|
|
287 | (1) |
|
14.2.3.4 Man-In-The-Middle (MITM) |
|
|
287 | (1) |
|
14.3 A 5G Wireless Security Architecture |
|
|
287 | (2) |
|
14.3.1 New Elements in 5G Wireless Security Architecture |
|
|
287 | (1) |
|
14.3.2 A 5G Wireless Security Architecture |
|
|
288 | (1) |
|
14.3.2.1 Network Access Security (I) |
|
|
288 | (1) |
|
14.3.2.2 Network Domain Security (II) |
|
|
289 | (1) |
|
14.3.2.3 User Domain Security (III) |
|
|
289 | (1) |
|
14.3.2.4 Application Domain Security (IV) |
|
|
289 | (1) |
|
14.4 5G Wireless Security Services |
|
|
289 | (11) |
|
14.4.1 Cryptography in 5G |
|
|
289 | (1) |
|
14.4.2 Identity Management |
|
|
290 | (1) |
|
14.4.3 Authentication in 5G |
|
|
291 | (4) |
|
14.4.3.1 Flexible Authentication |
|
|
291 | (1) |
|
14.4.3.2 Authentication Through Legacy Cellular System |
|
|
291 | (2) |
|
14.4.3.3 SDN Based Authentication in 5G |
|
|
293 | (1) |
|
14.4.3.4 Authentication of D2D in 5G |
|
|
294 | (1) |
|
14.4.3.5 Authentication of RFID in 5G |
|
|
294 | (1) |
|
14.4.4 Data Confidentiality in 5G |
|
|
295 | (2) |
|
|
295 | (2) |
|
14.4.4.2 Artificial Noise and Signal Processing |
|
|
297 | (1) |
|
14.4.5 Handover Procedure and Signaling Load Analysis |
|
|
297 | (1) |
|
14.4.6 Availability in 5G |
|
|
297 | (3) |
|
14.4.7 Location and Identity Anonymity in 5G |
|
|
300 | (1) |
|
|
300 | (3) |
|
14.5.1 3GPP 5G Key Architecture |
|
|
300 | (1) |
|
14.5.2 Key Management in 5G Handover |
|
|
301 | (1) |
|
14.5.3 Key Management for D2D Users |
|
|
302 | (1) |
|
14.6 Security for New Communication Techniques in 5G |
|
|
303 | (5) |
|
14.6.1 Heterogeneous Network and Massive MIMO in 5G |
|
|
303 | (1) |
|
14.6.2 Device-to-Device Communications in 5G |
|
|
304 | (2) |
|
14.6.3 Software-Defined Network in 5G |
|
|
306 | (2) |
|
14.6.4 Internet-of-Things in 5G |
|
|
308 | (1) |
|
14.7 Challenges and Future Directions for 5G Wireless Security |
|
|
308 | (2) |
|
|
308 | (1) |
|
14.7.2 New Security Attack Models |
|
|
308 | (1) |
|
14.7.3 Privacy Protection |
|
|
309 | (1) |
|
14.7.4 Flexibility and Efficiency |
|
|
309 | (1) |
|
14.7.5 Unified Security Management |
|
|
309 | (1) |
|
|
310 | (1) |
|
15 Security in V2X Communications |
|
|
311 | (22) |
|
15.1 Introduction to V2X Communications |
|
|
311 | (3) |
|
15.1.1 Generic System Architecture of V2X Communications |
|
|
311 | (1) |
|
15.1.2 Dedicated Short Range Communications |
|
|
312 | (1) |
|
15.1.3 Cellular Based V2X Communications |
|
|
313 | (1) |
|
15.2 Security Requirements and Possible Attacks in V2X Communications |
|
|
314 | (2) |
|
15.2.1 Security Requirements |
|
|
314 | (1) |
|
15.2.2 Attacks in V2X Communications |
|
|
315 | (1) |
|
|
316 | (1) |
|
15.3 IEEE WAVE Security Services for Applications and Management Messages |
|
|
316 | (4) |
|
15.3.1 Overview of the WAVE Protocol Stack and Security Services |
|
|
316 | (2) |
|
15.3.2 Secure Data Service and Security Service Management Entity |
|
|
318 | (1) |
|
15.3.3 CRL Verification Entity and P2P Certificate Distribution Entity |
|
|
319 | (1) |
|
15.4 Security in Cellular Based V2X Communications |
|
|
320 | (3) |
|
15.4.1 LTE-V2X Communication Security |
|
|
320 | (2) |
|
15.4.2 5G-V2X Communication Security |
|
|
322 | (1) |
|
15.5 Cryptography and Privacy Preservation in V2X Communications |
|
|
323 | (6) |
|
15.5.1 Identity Based Schemes |
|
|
323 | (2) |
|
15.5.2 Group Signature Based Schemes |
|
|
325 | (1) |
|
15.5.3 Batch Verification Schemes |
|
|
326 | (1) |
|
15.5.4 Reputation and Trust Based Schemes |
|
|
327 | (1) |
|
15.5.5 Identity Anonymity Preservation |
|
|
328 | (1) |
|
15.5.6 Location Anonymity Preservation |
|
|
328 | (1) |
|
15.6 Challenges and Future Research Directions |
|
|
329 | (2) |
|
15.6.1 Highly Efficient Authentication Schemes |
|
|
329 | (1) |
|
15.6.2 Efficient Revocation Mechanisms |
|
|
330 | (1) |
|
15.6.3 Advancing OBU and TPD Technologies |
|
|
330 | (1) |
|
15.6.4 Advancing Cryptography and Privacy Preservation Schemes |
|
|
330 | (1) |
|
15.6.5 Advancing Solutions to HetNet, SDN, and NFV |
|
|
330 | (1) |
|
15.6.6 Advancing Artificial Intelligence in V2X Communication Security |
|
|
330 | (1) |
|
|
331 | (2) |
References |
|
333 | (12) |
Index |
|
345 | |