Instant download Security in wireless communication networks yi qian pdf all chapter

Page 1


Security in Wireless Communication Networks Yi Qian

Visit to download the full and correct content document: https://ebookmass.com/product/security-in-wireless-communication-networks-yi-qian/

More products digital (pdf, epub, mobi) instant download maybe you interests ...

5G

Wireless Network Security and Privacy Dongfeng Fang

https://ebookmass.com/product/5g-wireless-network-security-andprivacy-dongfeng-fang/

Evolution of Wireless Communication Ecosystems Suat

Secgin

https://ebookmass.com/product/evolution-of-wirelesscommunication-ecosystems-suat-secgin/

Randomly Deployed Wireless Sensor Networks 1st Edition

Xi Chen

https://ebookmass.com/product/randomly-deployed-wireless-sensornetworks-1st-edition-xi-chen/

Federated Learning for Future Intelligent Wireless Networks Yao Sun

https://ebookmass.com/product/federated-learning-for-futureintelligent-wireless-networks-yao-sun/

Deploying Wireless Sensor Networks. Theory and Practice 1st Edition Mustapha Reda Senouci

https://ebookmass.com/product/deploying-wireless-sensor-networkstheory-and-practice-1st-edition-mustapha-reda-senouci/

Artificial Intelligence and Quantum Computing for Advanced Wireless Networks Savo G. Glisic

https://ebookmass.com/product/artificial-intelligence-andquantum-computing-for-advanced-wireless-networks-savo-g-glisic/

Malware Diffusion Models for Wireless Complex Networks. Theory and Applications 1st Edition Karyotis

https://ebookmass.com/product/malware-diffusion-models-forwireless-complex-networks-theory-and-applications-1st-editionkaryotis/

Multifunctional Antennas and Arrays for Wireless Communication Systems (Wiley - IEEE) 1st Edition

https://ebookmass.com/product/multifunctional-antennas-andarrays-for-wireless-communication-systems-wiley-ieee-1st-edition/

Quantum Communication, Quantum Networks, and Quantum Sensing Ivan Djordjevic

https://ebookmass.com/product/quantum-communication-quantumnetworks-and-quantum-sensing-ivan-djordjevic/

SecurityinWirelessCommunicationNetworks

YiQian

UniversityofNebraska-Lincoln,USA

FengYe

UniversityofDayton,USA

Hsiao-HwaChen

NationalChengKungUniversity,Taiwan

Thiseditionfirstpublished2022 ©2022JohnWiley&SonsLtd

Allrightsreserved.Nopartofthispublicationmaybereproduced,storedinaretrievalsystem,or transmitted,inanyformorbyanymeans,electronic,mechanical,photocopying,recordingorotherwise, exceptaspermittedbylaw.Adviceonhowtoobtainpermissiontoreusematerialfromthistitleisavailable athttp://www.wiley.com/go/permissions.

TherightofYiQian,FengYe,andHsiao-HwaChentobeidentifiedastheauthorsofthisworkhasbeen assertedinaccordancewithlaw.

RegisteredOffices

JohnWiley&Sons,Inc.,111RiverStreet,Hoboken,NJ07030,USA

JohnWiley&SonsLtd,TheAtrium,SouthernGate,Chichester,WestSussex,PO198SQ,UK

EditorialOffice

TheAtrium,SouthernGate,Chichester,WestSussex,PO198SQ,UK

Fordetailsofourglobaleditorialoffices,customerservices,andmoreinformationaboutWileyproducts visitusatwww.wiley.com.

Wileyalsopublishesitsbooksinavarietyofelectronicformatsandbyprint-on-demand.Somecontentthat appearsinstandardprintversionsofthisbookmaynotbeavailableinotherformats.

LimitofLiability/DisclaimerofWarranty

Whilethepublisherandauthorshaveusedtheirbesteffortsinpreparingthiswork,theymakeno representationsorwarrantieswithrespecttotheaccuracyorcompletenessofthecontentsofthisworkand specificallydisclaimallwarranties,includingwithoutlimitationanyimpliedwarrantiesofmerchantability orfitnessforaparticularpurpose.Nowarrantymaybecreatedorextendedbysalesrepresentatives,written salesmaterialsorpromotionalstatementsforthiswork.Thefactthatanorganization,website,orproduct isreferredtointhisworkasacitationand/orpotentialsourceoffurtherinformationdoesnotmeanthat thepublisherandauthorsendorsetheinformationorservicestheorganization,website,orproductmay provideorrecommendationsitmaymake.Thisworkissoldwiththeunderstandingthatthepublisheris notengagedinrenderingprofessionalservices.Theadviceandstrategiescontainedhereinmaynotbe suitableforyoursituation.Youshouldconsultwithaspecialistwhereappropriate.Further,readersshould beawarethatwebsiteslistedinthisworkmayhavechangedordisappearedbetweenwhenthisworkwas writtenandwhenitisread.Neitherthepublishernorauthorsshallbeliableforanylossofprofitorany othercommercialdamages,includingbutnotlimitedtospecial,incidental,consequential,orother damages.

LibraryofCongressCataloging-in-PublicationDataappliedfor: ISBN:9781119244363

CoverdesignbyWiley

Coverimage:©AnuchaCheechang/iStock/GettyImages

Setin9.5/12.5ptSTIXTwoTextbyStraive,Chennai,India 10987654321

Contents

Preface xvii

Acknowledgments xxiii

AbouttheCompanionWebsite xxv

PartIIntroductionandMathematicsBackground 1

1Introduction 3

1.1GeneralComputerCommunicationNetworkArchitecture 3

1.1.1WiredCommunicationNetworkInfrastructure 3

1.1.2WirelessCommunicationNetworkInfrastructure 4

1.2DifferentTypesofWirelessCommunicationSystems 5

1.2.1ClassificationofWirelessCommunicationSystems 5

1.2.1.1BasedonCoverage 5

1.2.1.2BasedonTopology 6

1.2.1.3BasedonMobility 6

1.2.2WirelessPersonalAreaNetworks 7

1.2.3WirelessLocalAreaNetworks 7

1.2.4WirelessWideAreaNetworks 7

1.3NetworkSecurityandWirelessSecurity 9

1.3.1NetworkSecurity 9

1.3.2SecurityThreatsinWirelessNetworks 10

1.4Summary 11

2BasicNetworkSecurityConcepts 13

2.1SecurityAttacks 13

2.1.1PassiveAttacks 13

2.1.1.1Eavesdropping 13

2.1.1.2TrafficAnalysis 14

2.1.2ActiveAttacks 15

2.2SecurityServices 16

2.2.1AccessControl 17

2.2.2Authentication 17

2.2.3Confidentiality 18

2.2.4Integrity 18

2.2.5Non-repudiation 19

2.2.6Availability 19

2.3SecurityMechanisms 21

2.3.1Encipherment 21

2.3.2Authentication 21

2.3.3AccessControl 22

2.3.4DigitalSignature 22

2.3.5DataIntegrity 23

2.3.6TrafficPaddingandRoutingControl 23

2.3.7Notarization 24

2.4OtherSecurityConcepts 24

2.4.1LevelsofImpact 24

2.4.2CryptographicProtocols 25

2.5Summary 25

3MathematicalBackground 27

3.1BasicConceptsinModernAlgebraandNumberTheory 27

3.1.1Group 27

3.1.1.1AbelianGroup 28

3.1.1.2CyclicGroup 28

3.1.2Ring 29

3.1.3Field 29

3.2PrimeNumbers,ModularArithmetic,andDivisors 30

3.2.1PrimeNumbers 30

3.2.2ModularArithmetic 30

3.2.3DivisorsandGCD 31

3.2.4MultiplicativeInverse 33

3.3FiniteFieldandGaloisField 34

3.4PolynomialArithmetic 35

3.4.1OrdinaryPolynomialArithmetic 35

3.4.2PolynomialArithmeticinFiniteFields 36

3.4.3ModularPolynomialArithmetic 37

3.4.4ComputationalConsiderations 39

3.4.5GeneratingaFiniteFieldwithaGenerator 40

3.5Fermat’sLittleTheorem,Euler’sTotientFunction,andEuler’sTheorem 41

3.5.1Fermat’sLittleTheorem 41

3.5.2EulerTotientFunction ��(n) 42

3.5.3Euler’sTheorem 43

3.6PrimalityTesting 44

3.7ChineseRemainderTheorem 46

3.8DiscreteLogarithm 48

3.9Summary 49

PartIICryptographicSystems 51

4CryptographicTechniques 53

4.1SymmetricEncryption 53

4.2ClassicalCryptographicSchemes 53

4.2.1ClassicalSubstitutionCiphers 54

4.2.1.1CaesarCipher 54

4.2.1.2MonoalphabeticCipher 55

4.2.1.3PlayfairCipher 57

4.2.1.4PolyalphabeticCipher 58

4.2.1.5AutokeyCipher 59

4.2.1.6One-TimePad 60

4.2.2ClassicalTranspositionCiphers 60

4.2.2.1RailFenceCipher 60

4.2.2.2RowTranspositionCipher 60

4.2.2.3ProductCipher 61

4.2.3MoreAdvancedClassicalCiphers 61

4.2.3.1RotorMachines 61

4.2.3.2Steganography 61

4.3StreamCipher 62

4.3.1RivestCipher4 62

4.4ModernBlockCiphers 63

4.4.1OverviewofModernBlockCiphers 63

4.4.2FeistelBlockCipher 64

4.4.2.1IdealBlockCipher 64

4.4.2.2FeistelCipherStructure 65

4.4.3BlockCipherDesign 67

4.5DataEncryptionStandards(DES) 67

4.5.1OverviewofDES 67

4.5.2InitialPermutation(IP) 68

4.5.3DESRoundFunction 69

4.5.3.1DESS-Boxes 71

4.5.3.2DESPermutationFunction 72

4.5.4DESKeySchedule 72

4.5.5DESSecurity 74

4.5.6MultipleEncryptionandDES 75

4.6Summary 76

5MoreonCryptographicTechniques 77

5.1AdvancedEncryptionStandards 77

5.1.1TheAESCipher:Rijndael 77

5.1.2AESDataStructure 77

5.1.3DetailsinEachRound 79

5.1.3.1SubstituteBytes 79

5.1.3.2ShiftRows 81

5.1.3.3MixColumns 81

5.1.3.4AddRoundKey 82

5.1.3.5AESKeyExpansion 82

5.1.3.6AESDecryption 84

5.1.3.7AESImplementationAspects 84

5.2BlockCipherModesofOperation 85

5.2.1ElectronicCodebook(ECB)Mode 85

5.2.2CipherBlockChaining(CBC)Mode 86

5.2.3CipherFeedback(CFB)Mode 87

5.2.4OutputFeedback(OFB)Mode 88

5.2.5TheCounter(CTR)Mode 89

5.2.6LastBlockinDifferentModes 90

5.2.7XTS-AESMode 90

5.3PublicKeyInfrastructure 92

5.3.1BasicsofPublicKeyCryptography 92

5.3.2Public-KeyApplications 94

5.3.3SecurityofPublicKeySchemes 94

5.4TheRSAAlgorithm 95

5.4.1RSAKeySetup 95

5.4.2RSAEncryptionandDecryption 96

5.4.3RSASecurityAnalysis 96

5.4.3.1FactoringProblem 97

5.4.3.2Timingattacks 97

5.4.3.3ChosenCiphertextAttacks 97

5.5Diffie–Hellman(D–H)KeyExchange 97

5.5.1Finite-FieldDiffie–Hellman 97

5.5.2Elliptic-CurveDiffie–Hellman 98

5.5.3Diffie–HellmanKeyExchangeVulnerability 98

5.6Summary 99

6MessageAuthentication,DigitalSignature,andKey Management 101

6.1MessageAuthentication 101

6.1.1MessageAuthenticationFunctions 101

6.1.2MessageAuthenticationCode 102

6.1.3HashFunctions 103

6.1.4SizeofMACandHashValue 104

6.2MACandHashAlgorithms 105

6.2.1DataAuthenticationAlgorithm 105

6.2.2ABasicHashFunctionStructure 106

6.2.3SecureHashAlgorithm(SHA) 106

6.2.4SHA-512 107

6.2.4.1SHA-512CompressionFunction 108

6.2.4.2SHA-512RoundFunction 109

6.2.5Whirlpool 111

6.2.6OtherMACFunctions 112

6.2.6.1KeyedHashFunctionsasMACs 112

6.2.6.2Cipher-BasedMAC 113

6.3DigitalSignatureandAuthentication 114

6.3.1DigitalSignatureProperties 115

6.3.2DigitalSignatureStandardandAlgorithm 116

6.3.3TheEllipticCurveDigitalSignatureAlgorithm 117

6.3.3.1ECDSADomainParameters 117

6.3.3.2ECDSAPrivate/PublicKeys 118

6.3.3.3ECDSADigitalSignatureGeneration 119

6.3.3.4ECDSADigitalSignatureVerification 120

6.3.4AuthenticationProtocols 120

6.4KeyManagement 122

6.4.1KeyDistributionwithSymmetricKeyEncryptions 122

6.4.2SymmetricKeyDistributionUsingPublicKeyCryptosystems 123

6.4.3DistributionofPublicKeys 124

6.4.4PublicKeyInfrastructure 126

6.4.5X.509AuthenticationService 126

6.5Summary 128

PartIIISecurityforWirelessLocalAreaNetworks 129

7WLANSecurity 131

7.1IntroductiontoWLAN 131

7.1.1Wi-FiOperatingModes 131

7.1.2ChallengesinWLANSecurity 132

7.1.3TricksthatFailtoProtectWLAN 133

7.2EvolutionofWLANSecurity 133

7.3WiredEquivalentPrivacy 135

7.3.1WEPAccessControl 135

7.3.2WEPIntegrityandConfidentiality 136

7.3.3WEPKeyManagement 136

7.3.4WEPSecurityProblems 137

7.3.4.1ProblemsinWEPAccessControl 138

7.3.4.2ProblemsinWEPIntegrity 138

7.3.4.3ProblemsinWEPConfidentiality 138

7.3.4.4ProblemsinWEPKeyManagement 139

7.3.5PossibleWEPSecurityEnhancement 140

7.4IEEE802.1XAuthenticationModel 140

7.4.1AnOverviewofIEEE802.1X 140

7.4.2ProtocolsinIEEE802.1X 141

7.4.3MappingtheIEEE802.1XmodeltoWLAN 143

7.5IEEE802.11iStandard 143

7.5.1OverviewofIEEE802.11i 143

x Contents

7.5.2IEEE802.11iAccessControl 143

7.5.3IEEE802.1iKeyManagement 145

7.5.4IEEE802.11iIntegrityandConfidentiality 147

7.5.4.1TKIPMode 147

7.5.4.2AES-CCMPMode 148

7.5.5Function Michael148

7.5.6Weaknessin802.11i 150

7.6Wi-FiProtectedAccess3andOpportunisticWirelessEncryption 150

7.6.1WPA3-Personal 150

7.6.2WPA3-Enterprise 150

7.6.3OpportunisticWirelessEncryption 151

7.7Summary 152

8BluetoothSecurity 153

8.1IntroductiontoBluetooth 153

8.1.1OverviewofBluetoothTechnology 153

8.1.2BluetoothVulnerabilitiesandThreats 154

8.1.2.1Bluesnarfing 155

8.1.2.2Bluejacking 155

8.1.2.3Bluebugging 155

8.1.2.4CarWhisperer 155

8.1.2.5FuzzingAttacks 155

8.1.3BluetoothSecurityServicesandSecurityModes 156

8.1.3.1BluetoothSecurityServices 156

8.1.3.2BluetoothSecurityModes 156

8.2LinkKeyGeneration 157

8.2.1LinkKeyGenerationforSecurityModes2and3 157

8.2.2LinkKeyGenerationforSecurityMode4 158

8.2.3AssociationModelinMode4 159

8.2.3.1Numericcomparison 159

8.2.3.2Out-of-Band(OOB) 160

8.2.3.3Passkeyentry 162

8.3Authentication,Confidentiality,andTrustandServiceLevels 163

8.3.1Authentication 163

8.3.2Confidentiality 164

8.3.3TrustandSecurityServiceLevels 165

8.4CryptographicFunctionsforSecurityModes1,2,and3 166

8.4.1SAFER+ 166

8.4.1.1OverviewoftheSAFER+ Structure 166

8.4.1.2SAFER+ RoundFunction 166

8.4.1.3SAFER+ KeySchedulefor128-BitKey 168

8.4.2Function E1 (⋅) 168

8.4.3Function E21 (⋅) 170

8.4.4Function E22 (⋅) 170

8.4.5Function E3 (⋅) 171

8.4.6Function E0 (⋅) 171

8.5CryptographicFunctionsinSecurityMode4(SSP) 173

8.5.1Function P192 (⋅) 173

8.5.2Function f1 (⋅) 174

8.5.3Function g(⋅) 174

8.5.3.1Function f2 (⋅) 174

8.5.3.2Function f3 (⋅) 174

8.6Summary 174

9ZigbeeSecurity 177

9.1IntroductiontoZigbee 177

9.1.1OverviewofZigbee 177

9.1.2SecurityThreatsAgainstZigbee 178

9.2IEEE802.15.4SecurityFeatures 179

9.2.1SecurityLevels 179

9.2.2IEEE802.15.4FrameStructure 180

9.3ZigbeeUpperLayerSecurity 182

9.3.1ZigbeeSecurityModels 182

9.3.2SecurityKeysinZigbee 183

9.3.3ZigbeeNetworkLayerSecurity 184

9.3.4ZigbeeApplicationSupportLayerSecurity 184

9.3.5OtherSecurityFeaturesinZigbee 185

9.4Security-RelatedMACPIBAttributes 187

9.5MechanismsUsedinZigbeeSecurity 188

9.5.1AES-CTR 188

9.5.2AES-CBC-MAC 189

9.5.3OverviewoftheAES-CCM 189

9.5.4NoncesAppliedtotheSecurityMechanisms 189

9.5.5Matyas–Meyer–OseasHashFunction 190

9.6Summary 191

10RFIDSecurity 193

10.1IntroductiontoRFID 193

10.1.1OverviewofRFIDSubsystems 193

10.1.2TypesofRFIDTags 193

10.1.3RFIDTransactions 194

10.1.4RFIDFrequencyBands 194

10.2SecurityAttacks,Risks,andObjectivesofRFIDSystems 195

10.2.1SecurityAttackstoRFIDSystems 195

10.2.2RFIDPrivacyRisks 195

10.2.3SecurityObjectives 196

10.3MitigationStrategiesandCountermeasuresforRFIDSecurityRisks 196

10.3.1CryptographicStrategies 196

10.3.1.1Encryption 196

10.3.1.2One-WayHashLocks 196

10.3.1.3EPCTagPINs 197

10.3.2Anti-CollisionAlgorithms 197

10.3.2.1Tree-Walking 197

10.3.2.2TheSelectiveBlockerTag 197

10.3.3OtherMitigationStrategies 198

10.3.3.1PhysicalShieldingSleeve(TheFaradayCage) 198

10.3.3.2SecureReaderProtocol1.0 198

10.4RFIDSecurityMechanisms 199

10.4.1HashLocks 199

10.4.1.1DefaultHashLocking 199

10.4.1.2RandomizedHashLocking 200

10.4.2HBProtocolandtheEnhancement 200

10.4.2.1HBProtocol 200

10.4.2.2HB+ Protocol 202

10.4.2.3HB++ Protocol 203

10.5Summary 205

PartIVSecurityforWirelessWideAreaNetworks 207

11GSMSecurity 209

11.1GSMSystemArchitecture 209

11.1.1MobileStation 209

11.1.2BaseStationSubsystem 210

11.1.3NetworkSubsystem 211

11.2GSMNetworkAccessSecurityFeatures 212

11.2.1GSMEntityAuthentication 212

11.2.2GSMConfidentiality 214

11.2.3GSMAnonymity 215

11.2.4DetectionofStolen/CompromisedEquipmentinGSM 215

11.3GSMSecurityAlgorithms 215

11.3.1Algorithm A3 216

11.3.2Algorithm A8 216

11.3.3AlgorithmCOMP128 216

11.3.4Algorithm A5 220

11.3.4.1 A5∕1 220

11.3.4.2Algorithm A5∕2 223

11.4AttacksAgainstGSMSecurity 225

11.4.1AttacksAgainstGSMAuthenticity 225

11.4.1.1AttacksAgainstGSMConfidentiality 226

11.4.2OtherAttacksagainstGSMSecurity 227

11.5PossibleGSMSecurityImprovements 227

11.5.1ImprovementoverAuthenticityandAnonymity 227

11.5.2ImprovementoverConfidentiality 228

11.5.3ImprovementoftheSignalingNetwork 228

11.6Summary 228

12UMTSSecurity 229

12.1UMTSSystemArchitecture 229

12.1.1UserEquipment 229

12.1.2UTRAN 230

12.1.3CoreNetwork 231

12.2UMTSSecurityFeatures 231

12.3UMTSNetworkAccessSecurity 232

12.3.1AuthenticationandKeyAgreement 232

12.3.1.1TheAKAMechanism 232

12.3.1.2AuthenticationVectorGeneration 234

12.3.1.3AKAontheUESide 236

12.3.2Confidentiality 237

12.3.3DataIntegrity 238

12.3.4UserIdentityConfidentiality 239

12.4AlgorithmsinAccessSecurity 240

12.4.1EncryptionAlgorithmf8 240

12.4.1.1IntegrityAlgorithmf9 241

12.4.2DescriptionofKASUMI 242

12.4.2.1AnOverviewofKASUMIAlgorithm 242

12.4.2.2RoundFunction Fi ( ) 244

12.4.2.3Function FL244

12.4.2.4Function FO244

12.4.2.5FunctionFI 245

12.4.2.6S-boxesS7andS9 245

12.4.2.7KeySchedule 247

12.4.3ImplementationandOperationalConsiderations 248

12.5OtherUMTSSecurityFeatures 249

12.5.1MobileEquipmentIdentification 249

12.5.2LocationServices 249

12.5.3User-to-USIMAuthentication 249

12.6Summary 250

13LTESecurity 251

13.1LTESystemArchitecture 251

13.2LTESecurityArchitecture 253

13.3LTESecurity 255

13.3.1LTEKeyHierarchy 255

13.3.2LTEAuthenticationandKeyAgreement 257

13.3.3SignalingProtection 258

13.3.3.1ProtectionofRadio-SpecificSignaling 259

13.3.3.2ProtectionofUser-PlaneTraffic 259

13.3.4OverviewofConfidentialityandIntegrityAlgorithms 259

13.3.4.1ConfidentialityMechanism 259

13.3.4.2IntegrityMechanism 260

13.3.5Non-3GPPAccess 261

13.4HandoverBetweeneNBs 261

13.4.1Overview 261

13.4.2KeyHandlinginHandover 262

13.4.2.1Initialization 262

13.4.2.2Intra-eNBKeyHandling 264

13.4.2.3Intra-MMEKeyHandling 265

13.4.2.4Inter-MMEKeyHandling 266

13.5SecurityAlgorithms 268

13.5.1128-EEA2 268

13.5.2128-EIA2 269

13.5.3EEA3 270

13.5.4EIA3 271

13.6SecurityforInterworkingBetweenLTEandLegacySystems 273

13.6.1BetweenLTEandUMTS 273

13.6.1.1IdleModeMobilityfromE-UTRANtoUTRAN 273

13.6.1.2IdleModeMobilityfromUTRANtoE-UTRAN 274

13.6.1.3HandoverModefromE-UTRANtoUTRAN 275

13.6.1.4HandoverModefromUTRANtoE-UTRAN 276

13.6.2BetweenE-UTRANandGERAN 277

13.6.2.1IdleMode 277

13.6.2.2HandoverMode 277

13.7Summary 278

PartVSecurityforNextGenerationWirelessNetworks 279

14Securityin5GWirelessNetworks 281

14.1Introductionto5GWirelessNetworkSystems 281

14.1.1TheAdvancementof5G 281

14.1.25GWirelessNetworkSystems 282

14.25GSecurityRequirementsandMajorDrives 283

14.2.1SecurityRequirementsfor5GWirelessNetworks 283

14.2.2MajorDrivesfor5GWirelessSecurity 284

14.2.2.1SupremeBuilt-in-Security 284

14.2.2.2FlexibleSecurityMechanisms 285

14.2.2.3Automation 285

14.2.3Attacksin5GWirelessNetworks 286

14.2.3.1EavesdroppingandTrafficAnalysis 286

14.2.3.2Jamming 286

14.2.3.3DoSandDDoS 287

14.2.3.4Man-In-The-Middle(MITM) 287

14.3A5GWirelessSecurityArchitecture 287

14.3.1NewElementsin5GWirelessSecurityArchitecture 287

14.3.2A5GWirelessSecurityArchitecture 288

14.3.2.1NetworkAccessSecurity(I) 288

14.3.2.2NetworkDomainSecurity(II) 289

14.3.2.3UserDomainSecurity(III) 289

14.3.2.4ApplicationDomainSecurity(IV) 289

14.45GWirelessSecurityServices 289

14.4.1Cryptographyin5G 289

14.4.2IdentityManagement 290

14.4.3Authenticationin5G 291

14.4.3.1FlexibleAuthentication 291

14.4.3.2AuthenticationThroughLegacyCellularSystem 291

14.4.3.3SDNBasedAuthenticationin5G 293

14.4.3.4AuthenticationofD2Din5G 294

14.4.3.5AuthenticationofRFIDin5G 294

14.4.4DataConfidentialityin5G 295

14.4.4.1PowerControl 295

14.4.4.2ArtificialNoiseandSignalProcessing 297

14.4.5HandoverProcedureandSignalingLoadAnalysis 297

14.4.6Availabilityin5G 297

14.4.7LocationandIdentityAnonymityin5G 300

14.55GKeyManagement 300

14.5.13GPP5GKeyArchitecture 300

14.5.2KeyManagementin5GHandover 301

14.5.3KeyManagementforD2DUsers 302

14.6SecurityforNewCommunicationTechniquesin5G 303

14.6.1HeterogeneousNetworkandMassiveMIMOin5G 303

14.6.2Device-to-DeviceCommunicationsin5G 304

14.6.3Software-DefinedNetworkin5G 306

14.6.4Internet-of-Thingsin5G 308

14.7ChallengesandFutureDirectionsfor5GWirelessSecurity 308

14.7.1NewTrustModels 308

14.7.2NewSecurityAttackModels 308

14.7.3PrivacyProtection 309

14.7.4FlexibilityandEfficiency 309

14.7.5UnifiedSecurityManagement 309

14.8Summary 310

15SecurityinV2XCommunications 311

15.1IntroductiontoV2XCommunications 311

15.1.1GenericSystemArchitectureofV2XCommunications 311

15.1.2DedicatedShortRangeCommunications 312

15.1.3CellularBasedV2XCommunications 313

15.2SecurityRequirementsandPossibleAttacksinV2XCommunications 314

15.2.1SecurityRequirements 314

15.2.2AttacksinV2XCommunications 315

15.2.3BasicSolutions 316

15.3IEEEWAVESecurityServicesforApplicationsandManagement Messages 316

15.3.1OverviewoftheWAVEProtocolStackandSecurityServices 316

15.3.2SecureDataServiceandSecurityServiceManagementEntity 318

15.3.3CRLVerificationEntityandP2PCertificateDistributionEntity 319

15.4SecurityinCellularBasedV2XCommunications 320

15.4.1LTE-V2XCommunicationSecurity 320

15.4.25G-V2XCommunicationSecurity 322

15.5CryptographyandPrivacyPreservationinV2XCommunications 323

15.5.1IdentityBasedSchemes 323

15.5.2GroupSignatureBasedSchemes 325

15.5.3BatchVerificationSchemes 326

15.5.4ReputationandTrustBasedSchemes 327

15.5.5IdentityAnonymityPreservation 328

15.5.6LocationAnonymityPreservation 328

15.6ChallengesandFutureResearchDirections 329

15.6.1HighlyEfficientAuthenticationSchemes 329

15.6.2EfficientRevocationMechanisms 330

15.6.3AdvancingOBUandTPDTechnologies 330

15.6.4AdvancingCryptographyandPrivacyPreservationSchemes 330

15.6.5AdvancingSolutionstoHetNet,SDN,andNFV 330

15.6.6AdvancingArtificialIntelligenceinV2XCommunicationSecurity 330

15.7Summary 331

References 333 Index 345

Preface

WefirstsignedthebookcontractwithWileyinearly2006.Threeyearsaftersigningthis bookcontract,weonlycompletedonethirdofthecontentsforthewholeoriginallyplanned book,becauseofunderestimatingthechallengesonwritingsuchaspecializedbook.When thefirstauthor,YiQian,joinedthefacultyoftheDepartmentofElectricalandComputer EngineeringatUniversityofNebraska-LincolninAugust2009,hecreatedanewcourseon wirelessnetworksecurityforthedepartment.Hehasbeenteachingthewirelessnetwork securitycourseinthesamedepartmenteveryyearinthespringsemestersincethen.When preparingthecoursematerialsforwirelessnetworksecurityeachyear,wefeelmoreand morestronglytohavesuchacomprehensivetextbookonwirelessnetworksecurity.In2015, wesignedtherevisedcontractwithWileyandjointlywithIEEEPress,andFengYewas addedasanewco-authorwhenhejustreceivedhisPh.D.degreeintheDepartmentof ElectricalandComputerEngineeringatUniversityofNebraska–Lincoln.Wehavebeen improvingthecontentsofthewirelessnetworksecuritycourseeveryyear,andgradually finishedmorechaptersofthebook.Fifteenyearsafterfirstsigningthecontractand12years afterteachingthesamecourse,withoverseveralthousandsofhoursjointeffortsfromallthe threeco-authors,weareverypleasedthatwehavecompletedthefirsteditionof“Security inWirelessCommunicationNetworks”andpublishedbyWiley/IEEEPressin2021.

Thisbookintendstobeaself-containedandonesemestertextbookforbothundergraduateseniorlevelandgraduatelevelcourses.Therearefivepartswith15chaptersinthe book.PartI,IntroductionandMathematicsBackground,includesthefirstthreechapterson generalintroductiononcomputercommunicationnetworksandwirelessnetworks,basic conceptsonnetworksecurity,andabriefreviewofthemathematicalbackgroundthatis neededtounderstandtherestofthechapters.PartII,CryptographicSystems,includesthe nextthreechaptersoncryptographictechniquesforbothsymmetricandpublickeycrypto systems,aswellasmessageauthentication,digitalsignature,andkeymanagement.Part III,SecurityforWirelessLocalAreaNetworks,includesfourchaptersonWi-Fisecurity, Bluetoothsecurity,Zigbeesecurity,andRFIDsecurity.PartIV,SecurityforWirelessWide AreaNetworks,includesthreechaptersonGSMsecurity,UMTSsecurity,andLTEsecurity. PartV,SecurityforNextGenerationWirelessNetworks,includestwochapterson5Gwirelessnetworksecurity,andvehicularcommunicationnetworksecurity.Inthefollowingisa briefintroductionforeachofthefifteenchapters.

Chapter1deliversthegeneralconceptofcomputernetworks,highlightstheroleofwirelesscommunicationsinthewholepictureofnetworkingarchitecture,andclassifiesthe wirelesssystemsbasedoncoverage,topology,andmobility.Thischapterservesasaprecursortotherestofthebookbyprovidingthebackgroundofdifferenttypesofwireless networks,includingwirelesspersonalareanetworks(WPAN),wirelesslocalareanetworks (WLAN),andwirelesswideareanetworks(WWAN).Italsoexplainsthesecuritythreatsin wirelessnetworksanddiscussestherelationshipbetweennetworksecurityandwireless security.

Chapter2givesanoverviewonthesecurityconceptsusedintherestofthisbook, includingsecurityattacks,securityservices,andsecuritymechanisms.Itfirstpresents theclassificationofsecurityattacksintermsofpassiveattacks(e.g.eavesdroppingand trafficanalysis)andactiveattacks(e.g.masquerade,replay,modification,anddenialof service).Itthenintroducessecurityservices,orthefeaturesinsystemdesignagainst possiblesecurityattacks,suchasconfidentiality,integrity,availability,accesscontrol, authentication,andnon-repudiation.Finally,toprovidesecurityserviceinasystem,a listofpopularsecuritymechanisms,suchastheencipherment,digitalsignature,etc.,is discussedintheremainingpartofthechapter.

Chapter3goesintothemathematicalbackgroundrelatedtowirelesssecurity,includingnumbertheoryandmodernalgebra,modulararithmeticanddivisors,finitefields, polynomialarithmetic,Fermat’slittletheorem,Euler’stotientfunction,Euler’stheory,etc. Theaforementionedknowledgeiscriticalfortheonestounderstandcryptography,such asadvancedencryptionstandardsandpublic-keycryptographicsystems.Inaddition,the fundamentalprinciplesandexemplarycasesareconciselypresentedfromtheperspective ofmathematics.

Afterthemathematicalbackground,Chapters4and5dealwithcryptographictechniques.Chapter4firstintroducesseveralsymmetrickeycryptographictechniquesby illustratingafewclassicalcryptographicalgorithmswithsubstitutionandtransposition techniques.Itthenpresentsthebasicconceptofmodernstream/blockcipheraswellas Feistelcipherstructure.Chapter5explainsmorecryptographictechniquesusingblock ciphersandpublickeyalgorithms,includingadvancedencryptionstandard,blockcipher modeofoperations,publickeyinfrastructure,RSAalgorithm,etc.

Chapter6introducesmessageauthenticationanddigitalsignaturetoprotecttheintegrity ofamessageandtheidentityofasenderandareceiver,respectively.First,thischapter discussesMACandhashfunctionsthoroughly,bothwidelyusedtoprovidemessage authentication.Then,itgoesintothecharacteristicsofdigitalsignatureandaseriesof digitalsignaturestandardssuchasDSA,RSA,andECDSA.Thesecanprotectthesender andreceiveragainsteachother.Withintheaforementionedmechanisms,keymanagement anddistributionplayacriticalrole.Therestofthechaptergivesageneralideaandsome examplesofkeymanagementschemes.Bothsymmetricandasymmetrickeydistributions havebeenillustrated.Thekeydistributionmechanismsadoptsymmetricandpublic keymechanismsfordifferentpurposes.Besides,practicalcommunicationsystemswith massiveusersneedhierarchicalkeydistributionmechanisms.Readersareexpectedto understandthebasicconceptsofthecryptographictechniquesillustratedinChapter5and Chapter6.Thesealgorithmswillbeseeninthewirelesssystemsintroducedinthelater

Preface

chapters.Thebackgroundoftheadvancedmathematicalcontents,suchasellipticcurve Diffie–Hellmankeyexchangeandellipticcurvedigitalsignature,etc.,maybeskipped.

Theremainingchaptersfrom7to15focusonthesecurityofspecificwirelesscommunicationsystems,coveringdifferentscalesofnetworksanddifferenttechnologies includingWLAN,Bluetooth,ZigBee,RFID,GSM,UMTS,LTE,and5G.Astheemerging vehicle-to-everything(V2X)communicationsarereceivinggreatattention,thefifteenth chapterespeciallydiscussesthesecurityofV2Xcommunications.

Chapter7discussesthesecurityofWirelessLocalAreaNetworks(WLAN)orinterchangeablyWi-Finowadays.ItstartswithanintroductionofWLANintermsofoperating modesandsecuritychallenges.WLANismorevulnerabletoattacksthanwiredconnectionsduetothelackofphysicalconnections.ItillustratesafewgenerationsofWLAN securityprotocols,whichevolvedfromtheoriginalWiredEquivalentPrivacydefinedby theIEEE802.11,Wi-FiProtectedAccess(WPA),WPA2,totherecentWPA3toimprove thesecurity.Italsoanalyzestheimplementationdetailsofthesesecurityprotocols.

Chapter8dealswithBluetoothsecurity.Bluetoothisanopenstandarddesignedfor wirelesspersonalareanetworks(WPAN).Bluetoothtechnologyenablesmanywireless devices,suchassmartwatches,wirelessheadphones,wirelesskeyboards,etc.Bluetooth standardspecifiesauthentication,authorization,andconfidentialityforsecuringdata transmission.Inthischapter,itanalyzesthesecuritymode,trustlevel,andservicelevel configurationsthatenableflexibilityofBluetoothsecuritypoliciesandhighlightthat Bluetoothspecificationsdonotensuresecureconnectionsfromalladversarypenetrations. IfusingBluetoothtechnologyinanorganization,itisimportanttodevelopsecurity policiestoaddresstheuseofBluetooth-enableddevicesandtheresponsibilitiesofusers.

Chapter9discussesthesecurityofZigbee.ItfirstgivesanoverviewofZigbeestandards relatedtodifferentnetworklayers,andthenmainlyanalyzesthekeycryptographicmechanisms.AsZigbeeadoptssymmetric-keycryptographicmechanisms,itespeciallyemphasizesthatthesecurestorageanddistributionofkeysisthepremiseofensuringthesecurity ofZigbee.Inpractice,thesecurityprovidedbyZigbeestandardsisnotenough.Forexample, ifaZigbeedevicejoinsanetwork,intruderscaninterceptunprotectedkeys.Moreover,an attackermayeasilygetphysicalaccesstoaZigbeedeviceandextractprivilegedinformationduetothelow-costnature.Thesecuritymustbecarefullyconsideredtoprovidethose applications.

Chapter10dealswiththesecurityofRFID.ItfirstgivesanoverviewofRFIDsubsystems, differenttypesofRFIDtags,andthefrequencybands.Itthenanalyzesthesecurityattacks, risks,andsecurityobjectivesofRFIDsystems.RFIDsystemsarevulnerabletosomeattacks (e.g.counterfeittag,eavesdropping,andelectroniccollisions)andprivacyrisks(e.g.disclosureoflocationinformationofusers).ThesecurityobjectivesoftheRFIDsysteminclude confidentiality,integrity,non-repudiation,andavailability.Duetothelowcostandphysical constraintsofRFIDtags,mitigationmechanismstosecurityrisksarelimited.Thechapter thenelaboratesonthelightweightcryptographicalgorithms,anti-collisionalgorithms,and physicalprotectionavailableforRFID.ItisimperativetoprovidesecurityservicestoRFID systems.

Chapter11dealswiththesecurityofGlobalSystemforMobile(GSM)Communications. Sincetheearly1990s,asthemostwidelyusedcellularmobilephonesystemintheworld,

GSMcanprovideserviceslikevoicecommunications,shortmessaging,etc.Thischapter startswiththeGSMsystemarchitectureandthendiscussesthenetworkaccesssecurity featuresandalgorithms.Despitethepopularity,theGSMsystemisexposedtoquiteafew threats.Inthechapter,itmainlydiscussestheattackscausedbythevulnerabilityofsecurity algorithms,aswellassomepossiblesecurityimprovements.Unfortunately,GSMmadevery fewimprovementsontheseaspectsbeforephasingoutrecently.

Chapter12introducesthesecurityofUniversalMobileTelecommunicationsSystem (UMTS).UMTSisasuccessorofGSMwithbettersecurity.Severalsecuritymechanisms arereusedbutwithmodifications.AfterintroducingUMTSarchitecture,thechapter discussesthesecuritymechanismsofUMTS,liketheauthenticationandkeyagreement, dataconfidentialityandintegrity,useridentityconfidentiality.Comparedwiththe GSM,UMTSaddsintegrityprotection.Algorithmsf8andf9ensureconfidentialityand integrity,respectively.BothalgorithmsarebasedonblockcipherKASUMI.Readers maybeinterestedinsomeadditionalsecurityfeaturesofUMTS,suchasmobiledevice identification,locationservices,anduser-to-USIMauthentication,whicharediscussedat theendofthechapter.

Chapter13illustratesLong-TermEvolution(LTE)security.Itstartswiththeintroduction oftheLTEsystemarchitecturewhichisbasedonGSMandUMTS.Akeydifferencewithits predecessorsisthatLTEseparatesthecontrolplaneanduserplane,differingLTEsecurity fromGSMandUMTS.ItthendepictsLTEsecurityintermsofsecurityarchitecture,security mechanisms,andalgorithms.LTEcoversmorekeysandsecurityalgorithms,suchasAES andZUC,toensurethesecurityofcomplexsystems.ItalsohighlightstheLTEsecurity forinterworkingwithlegacysystemsaswellasnon-3GPPaccess.LTEhasstrongsecurity implementedcomparingwiththepreviousgenerationsystem.LTEwillcontinuetoserve asanimportantpartofthenext-generationwirelesssystem.

Chapter14discussesthesecurityof5thgeneration(5G)wirelessnetworksystems.5G startedlarge-scalecommercialdeploymentaround2020andisthenext-generationmobile wirelesstelecommunicationsbeyond4G/InternationalMobileTelecommunications (IMT)-AdvancedSystems.Thischapterillustratessomecurrentdevelopment,challenges, andfuturedirectionsof5Gwirelessnetworksecurity.Itespeciallyanalyzesseveralnew securityrequirementsandchallengesintroducedbytheadvancedfeaturesofthe5Gwirelessnetworksystems.Duetotheongoingdevelopmentof5G,thechapteronlydiscusses somepresentsolutionsandresearchresultsconcerningthesecurityof5Gwirelessnetwork systems.Quiteafewchallengesin5Gwirelessnetworksecurity,includingnewtrustmodels,newsecurityattackmodels,privacyprotection,etc.,callforcontinuousdevelopment of5Gsecurity.Itbrieflyanalyzesthesechallengesinthefinalpartofthechapter.

Inrecentyears,asakeycomponentofIntelligentTransportationSystems,vehicle-toeverything(V2X)communicationshavereceivedgreatattention.Therapiddevelopment ofwirelesstechnologies(e.g.DSRC,LTE,and5G)enablesV2Xcommunicationsin differentapplications.Tointegratethevarietyofwirelesstechnologiesandmeetspecial requirementsforV2Xcommunications,securityandprivacyhavebecomeatoppriority. Therefore,thelastchapterofthebooksetsofftodiscussthesecurityofV2Xcommunications.StandardssuchasIEEEWAVEandLTE-V2XsetageneralguidelineforV2Xsecurity implementations.Newcryptographyschemes,suchasgroupsignatureandtrust-based schemes,areunderdevelopment.Thischaptercoversallthesetopics.Asanemerging

Preface xxi

typeofwirelesscommunicationscenario,quiteafewunsolvedsecuritychallengesexist inV2Xcommunications.Itdiscussesseveralkeychallenges,includingefficientschemes, hardwareenhancement,andintegrationofAIalgorithms,etc.,attheendofthechapter. Ourteachingphilosophyislettingthestudentslearnthebasicbuildingblocksthatare necessarytodesignasecurewirelesssystemandlearnthesecuritydesignsofdifferent wirelesscommunicationnetworksfromthehistorytothenextgeneration,alsodifferent scalesfrompersonalarea,localarea,towideareawirelessnetworks,sothatthestudents willbeabletohandlethenewdesignsoffuturesecurewirelesssystems.

April2021

YiQian UniversityofNebraska-Lincoln,USA

FengYe UniversityofDayton,USA

Hsiao-HwaChen NationalChengKungUniversity,Taiwan

Acknowledgments

Wewouldliketothankalltheundergraduateandgraduatestudentswhohavetaken thewirelessnetworksecurityclassesattheUniversityofNebraska–Lincolninthelast12 years,withouttheinteractionswiththestudentsandthefeedbacksfromthestudentsthis bookwouldnothavebeenpossible.Weexpressourdeepappreciationfortheirenthusiasm andtheireagernessoflearningthesubjects.WeespeciallythankthosePh.D.students whostudiedthewirelessnetworksecuritycourseandgraduatedintheDepartmentof ElectricalandComputerEngineeringatUniversityofNebraska–Lincolnorworkedas apostdoctorateresearcherthere,fortheircontinuoushelpwithimprovingthecourse materials,andadaptingourwirelessnetworksecuritycoursemodulesintheirnew schoolsforteaching,specificallyattheUniversityofWisconsin,UniversityofDayton,City UniversityofNewYork,DakotaStateUniversity,CaliforniaPolytechnicStateUniversity, UniversityofCentralMissouri,andUniversityofTexas.

WearesincerelyindebtedtoProfessorDavidTipperattheUniversityofPittsburghfor hisadviceandhelpwhenwefirstcreatedthewirelessnetworksecuritycourseatthe UniversityofNebraska-Lincoln12yearsago.ManythankstoProfessorTipperforhis endlessadviceandsupport,andtheencouragementforcompletingthisbook.

WeexpressourthankstothestaffofWiley,fortheircontinuoussupportforthisundertakingoverthelast15years.WewouldliketothankSandraGrayson,SeniorEditoratWiley, forallthesupportandguidance,aswellasforprovidingtheneededextrapushtokeepus indelivering.WethankJulietBooker,ManagingEditoratWiley,andseveralmorestaffat Wiley,fortheirpatienceindealingwithelectronictransferofmanuscriptsandhandling publicationissues.

Lastlybutnotleast,wethankourfamiliesfortheirsupportandpatiencewhileweworked onthisbookovertheseyears.

Webelievethatwehavegivenourbesttoensurethereadability,completeness,andaccuracyofthebook.However,itispossiblethatsomeerrorsandomissionsmaystillhave remainedundetected.Weappreciateanyfeedbackintendedtocorrectsucherrors.

Wearethankfultoeveryone!

AbouttheCompanionWebsite

Thisbookisaccompaniedbyacompanionwebsite:

www.wiley.com/go/qian/sec51

Thewebsiteincludes:

● LectureSlides

Note:Theauthorsplantosupplyadditionalsupplementaryresourcesuptooneyearafter initialpublication.

IntroductionandMathematicsBackground

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.