ABSTRACT
Information Science and Technology Department, Dalian Maritime University,
Dalian, China
Xiaojiang Du
Department of Computer and Information Sciences, Temple University, Philadelphia,
Pennsylvania
12.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362 12.2 Security in 4G Wireless System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
12.2.1 Security Objectives, Requirements, and Challenges . . . . . . . . . 364 12.2.2 Security Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
12.2.2.1 Wi-Fi Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 12.2.2.2 WiMAX Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367 12.2.2.3 3GPP LTE Security . . . . . . . . . . . . . . . . . . . . . . . . . . 373
12.2.3 Possible Threats on 4G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376 12.3 Security in Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
12.3.1 Vulnerabilities of the Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . 377 12.3.2 Security Requirements to Ad Hoc Networks . . . . . . . . . . . . . . . . 377 12.3.3 Attacks to Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
12.3.3.1 Passive Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378 12.3.3.2 Active Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
12.3.4 Security Solutions to Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . 382 12.3.4.1 Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382 12.3.4.2 Detection and Reaction . . . . . . . . . . . . . . . . . . . . . . 383
12.3.5 Challenges in Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 12.4 Security in Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
12.4.1 Privacy Preservation in WSNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387 12.4.1.1 Data Oriented . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387 12.4.1.2 Context Oriented . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
12.4.2 Security in Unattended Wireless Sensor Networks . . . . . . . . . . 394 12.4.2.1 Curious Attackers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394 12.4.2.2 Search-and-Erase Attackers . . . . . . . . . . . . . . . . . . 395 12.4.2.3 Search-and-Replace Attackers . . . . . . . . . . . . . . . . 395
12.4.3 Security in Underwater Wireless Networks . . . . . . . . . . . . . . . . . 396 12.4.3.1 Vunerablilities and Attacks in UWNs . . . . . . . . . 396 12.4.3.2 Security Techniques . . . . . . . . . . . . . . . . . . . . . . . . . 397 12.4.3.3 Open Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
12.4.4 Security in Wireless Multimedia Sensor Networks . . . . . . . . . . 400 12.4.4.1 Security Challenges in WMSNs . . . . . . . . . . . . . . 400 12.4.4.2 Privacy in WMSNs . . . . . . . . . . . . . . . . . . . . . . . . . . 402 12.4.4.3 Authentification in WMSNs . . . . . . . . . . . . . . . . . . 403 12.4.4.4 Secure Node Localization in WMSNs . . . . . . . . 403 12.4.4.5 Trust Management in WMSNs . . . . . . . . . . . . . . . 403 12.4.4.6 Security in Data Aggregation for WMSNs . . . . 404 12.4.4.7 Security Challenges for Future WMSNs . . . . . . 404
12.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
As wireless technologies are developed so fast, they also need a generation of se-
curity and privacy control techniques. However, the broadcast nature of wireless
communications, wireless device mobility, and resource limitations make security
in wireless networks an especially challenging problem. This chapter will provide
state-of-the-art research results and future trends related to security in wireless net-
works, including 4G network, ad-hoc networks, and sensor network.