Securing Emerging Wireless Systems Lower-layer Approaches

Securing Emerging Wireless Systems focuses on security for wireless networks by using complementary techniques that aim to invoke unique properties of wireless communications rather than cryptographic solutions. Throughout this book the authors explore a

  • PDF / 8,023,325 Bytes
  • 366 Pages / 439.37 x 666.142 pts Page_size
  • 0 Downloads / 205 Views

DOWNLOAD

REPORT


Yingying Chen • Wenyuan Xu • Wade Trappe • YanYong Zhang

Securing Emerging Wireless Systems Lower-Layer Approaches

Yingying Chen Stevens Institute of Technology Hoboken, NJ USA

Wenyuan Xu University of South Carolina Columbia, SC USA

Wade Trappe Rutgers University North Brunswick, NJ USA

Yanyong Zhang Rutgers University North Brunswick, NJ USA

ISBN 978-0-387-88490-5

e-ISBN 978-0-387-88491-2

Library of Congress Control Number: 2008936474 © 2009 Springer Science+Business Media, LLC All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, LLC, 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. While the advice and information in this book are believed to be true and accurate at the date of going to press, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Printed on acid-free paper. springer.com

To Our Families

Preface

We live in an increasingly wireless world and, even though the benefits of tetherless communication are sure to attract a plethora of new applications and help bring communication to those who were never before connected to the broader world, these very same benefits can also serve as the means to cause damage upon individuals, enterprises and governments. Unlike traditional wired communication, where physically protecting the medium is, to a large part, possible by running cables underground and wires in walls, wireless communication is not able to physically protected in the conventional sense. Sure, wireless access points are placed in buildings that may be locked, or cellular basestations are protected by fences and security cameras, but the medium itself is trivially open to a broad array of threats and thus securing wireless communication necessitates a collection of tools that can suitable protect the wireless medium. This book is about security for wireless networks. However, whereas most conventional approaches to security focus on cryptographic solutions that are applied in building families of interconnected network security protocols, this book instead focuses on complementary techniques that aim to invoke unique properties of wireless communications in order to add security to wireless systems. In order to place this book in an appropriate context, it is perhaps best to think of a simple ana