Chapter 5

Mobile Wireless Network Security

Michel Barbeau

5.1 Introduction

Mobile wireless networks have two main aspects: wireless communications and mobility support. This chapter reviews issues and solutions that are specific to the security of mobile and wireless networks. An attempt has been made to cover representative techniques, while avoiding redundancies in the concepts. Examples are drawn from fully public domain technologies such as WiFi/802.11 and mobile IP.

It is assumed that the reader is familiar with the basic cryptographic techniques, such as one-way hash functions, symmetric key cryptography, asymmetric key cryptography, and public key infrastructure, and computer networks. On cryptography, we recommend the books from Stallings ...

Get Handbook on Securing Cyber-Physical Critical Infrastructure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.