O'Reilly logo

Handbook on Securing Cyber-Physical Critical Infrastructure by Nan Zhang, Krishna Kant, Sajal K Das

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5

Mobile Wireless Network Security

Michel Barbeau

5.1 Introduction

Mobile wireless networks have two main aspects: wireless communications and mobility support. This chapter reviews issues and solutions that are specific to the security of mobile and wireless networks. An attempt has been made to cover representative techniques, while avoiding redundancies in the concepts. Examples are drawn from fully public domain technologies such as WiFi/802.11 and mobile IP.

It is assumed that the reader is familiar with the basic cryptographic techniques, such as one-way hash functions, symmetric key cryptography, asymmetric key cryptography, and public key infrastructure, and computer networks. On cryptography, we recommend the books from Stallings ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required