Inside Radio: An Attack and Defense Guide

This book discusses the security issues in a wide range of wireless devices and systems, such as RFID, Bluetooth, ZigBee, GSM, LTE, and GPS. It collects the findings of recent research by the UnicornTeam at 360 Technology, and reviews the state-of-the-art

  • PDF / 32,637,791 Bytes
  • 380 Pages / 453.543 x 683.15 pts Page_size
  • 21 Downloads / 193 Views

DOWNLOAD

REPORT


Inside Radio: An Attack and Defense Guide

Inside Radio: An Attack and Defense Guide

Qing Yang Lin Huang •

Inside Radio: An Attack and Defense Guide

123

Qing Yang Radio Security Research Department 360 Technology Co. Ltd. Beijing China

Lin Huang Radio Security Research Department 360 Technology Co. Ltd. Beijing China

ISBN 978-981-10-8446-1 ISBN 978-981-10-8447-8 https://doi.org/10.1007/978-981-10-8447-8

(eBook)

Jointly published with Publishing House of Electronics Industry, Beijing ISBN: 978-7-121-28580-6 Publishing House of Electronics Industry, Beijing Library of Congress Control Number: 2018933012 © Publishing House of Electronics Industry, Beijing and Springer Nature Singapore Pte Ltd. 2018 This work is subject to copyright. All rights are reserved by the Publishers, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publishers, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publishers nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publishers remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Printed on acid-free paper This Springer imprint is published by Springer Nature The registered company is Springer Nature Singapore Pte Ltd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore

Foreword I

I have been teaching and studying communication theory for more than 20 years and have undertaken multiple scientific research projects on the national level. By cooperating with enterprises in development projects, I accumulated some experience in communication system design, algorithm optimization, and protocol implementation. It can be said that all communication systems have security problems. The security of communication systems includes device security, content security, and defense. With the advancement of communication and network technologies, various security measures have been developed and updated. However, the development of Internet technology has caused a lot of security concerns. In recent years, the government is paying more and more attention to network security, and wireless security has attracted the interest of the government, enterpris