ABSTRACT

Information Science and Technology Department, Dalian Maritime University,

Dalian, China

Xiaojiang Du

Department of Computer and Information Sciences, Temple University, Philadelphia,

Pennsylvania

12.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362 12.2 Security in 4G Wireless System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364

12.2.1 Security Objectives, Requirements, and Challenges . . . . . . . . . 364 12.2.2 Security Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365

12.2.2.1 Wi-Fi Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 12.2.2.2 WiMAX Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367 12.2.2.3 3GPP LTE Security . . . . . . . . . . . . . . . . . . . . . . . . . . 373

12.2.3 Possible Threats on 4G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376 12.3 Security in Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377

12.3.1 Vulnerabilities of the Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . 377 12.3.2 Security Requirements to Ad Hoc Networks . . . . . . . . . . . . . . . . 377 12.3.3 Attacks to Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378

12.3.3.1 Passive Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378 12.3.3.2 Active Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379

12.3.4 Security Solutions to Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . 382 12.3.4.1 Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382 12.3.4.2 Detection and Reaction . . . . . . . . . . . . . . . . . . . . . . 383

12.3.5 Challenges in Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 12.4 Security in Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387

12.4.1 Privacy Preservation in WSNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387 12.4.1.1 Data Oriented . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387 12.4.1.2 Context Oriented . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390

12.4.2 Security in Unattended Wireless Sensor Networks . . . . . . . . . . 394 12.4.2.1 Curious Attackers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394 12.4.2.2 Search-and-Erase Attackers . . . . . . . . . . . . . . . . . . 395 12.4.2.3 Search-and-Replace Attackers . . . . . . . . . . . . . . . . 395

12.4.3 Security in Underwater Wireless Networks . . . . . . . . . . . . . . . . . 396 12.4.3.1 Vunerablilities and Attacks in UWNs . . . . . . . . . 396 12.4.3.2 Security Techniques . . . . . . . . . . . . . . . . . . . . . . . . . 397 12.4.3.3 Open Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397

12.4.4 Security in Wireless Multimedia Sensor Networks . . . . . . . . . . 400 12.4.4.1 Security Challenges in WMSNs . . . . . . . . . . . . . . 400 12.4.4.2 Privacy in WMSNs . . . . . . . . . . . . . . . . . . . . . . . . . . 402 12.4.4.3 Authentification in WMSNs . . . . . . . . . . . . . . . . . . 403 12.4.4.4 Secure Node Localization in WMSNs . . . . . . . . 403 12.4.4.5 Trust Management in WMSNs . . . . . . . . . . . . . . . 403 12.4.4.6 Security in Data Aggregation for WMSNs . . . . 404 12.4.4.7 Security Challenges for Future WMSNs . . . . . . 404

12.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405

As wireless technologies are developed so fast, they also need a generation of se-

curity and privacy control techniques. However, the broadcast nature of wireless

communications, wireless device mobility, and resource limitations make security

in wireless networks an especially challenging problem. This chapter will provide

state-of-the-art research results and future trends related to security in wireless net-

works, including 4G network, ad-hoc networks, and sensor network.