無(wú)線(xiàn)局域網(wǎng)安全接入-體系結(jié)構(gòu)與協(xié)議
定 價(jià):58 元
叢書(shū)名:信息安全系列叢書(shū)
- 作者:馬建峰 等著
- 出版時(shí)間:2009/4/1
- ISBN:9787040262100
- 出 版 社:高等教育出版社
- 中圖法分類(lèi):TN925
- 頁(yè)碼:
- 紙張:膠版紙
- 版次:
- 開(kāi)本:16開(kāi)
Security Access in Wireless Local Area Networks From Architecture andProtocols to Realization deals with the method and technology of the WLANsecurity architecture, design and analysis of security protocols for WLAN,and WLAN security management.The book is intended for researchers in wireless communication, electricaland computer engineering, and for graduate students.The authors are with Xidian University, P. R. China, where Dr. Jianfeng Mais a professor of computer science and the director of the Key Laboratory of Computer Networks and Information Security (Ministry of Education).
1 Introduction
1.1 Overview
1.2 Key Issues of WLAN Security
1.3 Realization
Questions and discussion
References
2 Security Architecture Framework
2.1 Security Attacks and Requirements
2.2 Management-Based WLAN Security Architecture
2.3 Evolution of Security Architecture for WLAN Access
2.4 The Integrated Security Access Authentication Architecture for WLAN Terminals
Questions and Discussions
References
3 Security Access Protocol
3.1 Security Analysis of WAPI
3.2 Analysis and Improvement of WAPI
3.3 Authentication Scheme that Compatible with 802.1 li and WAPI
3.4 WAPI-XG1 Access Authentication and Fast Handoff Protocol
3.5 Self-Certified Public Key based WAPI Authentication and Key Agreement Protocol
Questions and discussion
Reference
4 Security Protocols for Fast BSS Transition
4.1 IEEE 802.11r
4.2 Security Solution for IEEE 802.1 lr Drafts
4.3 FT Security Solution Based on Location
Questions and discussion
References
5 Security Protocols in WLAN Mesh
5.1 Overview of WLAN Mesh
5.2 WLAN Mesh Authentication Schemes
5.3 Protocols for Access Authentication, Secure Fast Handoff and Roaming
Questions and discussion
Reference
6 Authenticated Key Exchange Protocol
7 Privacy Protection for WLAN
8 Adaptive Security Policy
9 Evaluation Method of Security Performance
10 Architecture of Trusted Terminal
11 Architecture of Trusted Network Connect
Index