{"title":"无线网络安全","authors":"Kutub Thakur, A. Pathan","doi":"10.1201/9781003035626-9","DOIUrl":null,"url":null,"abstract":"With the penetration of mobile device use as well as embedded and cyber-physical systems deployment, the underlying wireless communication and network systems have become critical society infrastructures, and thus their security and privacy are critical to the wellbeing of our society. This course will exam the challenges in providing secure communication and network services in a variety of wireless systems, as well as the existing and emerging approaches to managing these challenges. Focus will be placed on securing the operation and performance of wireless networks, with less emphasis on information security. Topics to be covered include vulnerabilities, attacks, security mechanisms, and trade-offs at various layers of the network protocol stack, from aspects of physical communication to application and service security issues; examples include jamming, MAC-layer misbehavior, selective packet dropping, decentralized trust and reputation, and crosslayer holistic attacks. Systems of interest include, but are not limited to, personal devices, connected vehicles, IoT and cyber-physical systems, wireless infrastructure, and ad hoc networks.","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"209 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Wireless Network Security\",\"authors\":\"Kutub Thakur, A. Pathan\",\"doi\":\"10.1201/9781003035626-9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the penetration of mobile device use as well as embedded and cyber-physical systems deployment, the underlying wireless communication and network systems have become critical society infrastructures, and thus their security and privacy are critical to the wellbeing of our society. This course will exam the challenges in providing secure communication and network services in a variety of wireless systems, as well as the existing and emerging approaches to managing these challenges. Focus will be placed on securing the operation and performance of wireless networks, with less emphasis on information security. Topics to be covered include vulnerabilities, attacks, security mechanisms, and trade-offs at various layers of the network protocol stack, from aspects of physical communication to application and service security issues; examples include jamming, MAC-layer misbehavior, selective packet dropping, decentralized trust and reputation, and crosslayer holistic attacks. Systems of interest include, but are not limited to, personal devices, connected vehicles, IoT and cyber-physical systems, wireless infrastructure, and ad hoc networks.\",\"PeriodicalId\":127635,\"journal\":{\"name\":\"Cybersecurity Fundamentals\",\"volume\":\"209 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-04-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cybersecurity Fundamentals\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1201/9781003035626-9\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cybersecurity Fundamentals","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/9781003035626-9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
With the penetration of mobile device use as well as embedded and cyber-physical systems deployment, the underlying wireless communication and network systems have become critical society infrastructures, and thus their security and privacy are critical to the wellbeing of our society. This course will exam the challenges in providing secure communication and network services in a variety of wireless systems, as well as the existing and emerging approaches to managing these challenges. Focus will be placed on securing the operation and performance of wireless networks, with less emphasis on information security. Topics to be covered include vulnerabilities, attacks, security mechanisms, and trade-offs at various layers of the network protocol stack, from aspects of physical communication to application and service security issues; examples include jamming, MAC-layer misbehavior, selective packet dropping, decentralized trust and reputation, and crosslayer holistic attacks. Systems of interest include, but are not limited to, personal devices, connected vehicles, IoT and cyber-physical systems, wireless infrastructure, and ad hoc networks.