| Acknowledgments | p. xv |
| About the Authors | p. xvii |
| Foreword | p. xix |
| Introduction to Wireless | p. 1 |
| Welcome to a Wireless World | p. 3 |
| History of Wireless Technologies | p. 5 |
| The 1970s--The First Wireless Networks | p. 7 |
| The 1980s--Wireless Markets Start to Evolve | p. 8 |
| The 1990s--Wireless Networks Mature | p. 11 |
| The Mid-1990s--Other Wireless Networks Emerge | p. 13 |
| The Late 1990s--The Wireless Internet Emerges | p. 15 |
| History of Wireless Security | p. 20 |
| Eavesdropping and Jamming | p. 21 |
| The Wireless Internet--Wireless Security Moves into the Mainstream | p. 22 |
| Wireless Value Chain | p. 23 |
| State of the Wireless Industry, 2001 | p. 29 |
| North American Wireless Industry, 2001 | p. 30 |
| European Wireless Industry, 2001 | p. 37 |
| Japanese Wireless Industry, 2001 | p. 40 |
| Asian Wireless Industry, 2001 | p. 43 |
| Conclusion | p. 44 |
| Wireless Threats | p. 47 |
| The Uncontrolled Terrain | p. 47 |
| Eavesdropping | p. 48 |
| Communications Jamming | p. 50 |
| Denial of Service (DoS) Jamming | p. 50 |
| Injection and Modification of Data | p. 51 |
| Man-in-the-Middle (MITM) Attacks | p. 52 |
| Rogue Client | p. 52 |
| Rogue Network Access Points | p. 53 |
| Attacker Equipment | p. 56 |
| Covert Wireless Channels | p. 59 |
| Roaming Issues | p. 60 |
| Cryptographic Threats | p. 62 |
| Conclusion | p. 62 |
| Introduction to Wireless Security Protocols and Cryptography | p. 63 |
| Removing the FUD | p. 63 |
| OSI Model | p. 64 |
| OSI Simplified | p. 65 |
| Internet Model | p. 66 |
| Wireless Local Area Network (LAN) Security Protocols | p. 67 |
| Cryptography | p. 68 |
| Secure Sockets Layer/Transport Layer Security (SSL/TLS) | p. 69 |
| Secure Shell (SSH) | p. 71 |
| Protocol or Program? | p. 71 |
| Terminal Access and File Transfer | p. 71 |
| Port Forwarding | p. 72 |
| A Word of Caution | p. 73 |
| Man-in-the-Middle (MITM) of SSL/TLS and SSH | p. 73 |
| WTLS | p. 74 |
| WEP | p. 75 |
| 802.1x | p. 75 |
| IP Security (IPSec) | p. 76 |
| Conclusion | p. 78 |
| Security Considerations for Wireless Devices | p. 79 |
| Wireless Device Security Issues | p. 79 |
| Physical Security | p. 80 |
| Information Leakage | p. 81 |
| Device Security Features | p. 82 |
| Application Security | p. 83 |
| Detailed Device Analysis | p. 83 |
| Laptops | p. 84 |
| Personal Digital Assistants (PDAs) | p. 86 |
| Wireless Infrastructure | p. 88 |
| Handsets | p. 89 |
| Conclusion | p. 90 |
| Wireless Technologies and Applications | p. 91 |
| Introduction to Cellular Networks | p. 93 |
| FDMA | p. 94 |
| TDMA | p. 96 |
| CDMA | p. 98 |
| Spread Spectrum Primer | p. 99 |
| Analogy | p. 99 |
| TDMA Versus CDMA | p. 101 |
| PDC | p. 103 |
| iDEN: An Emerging Fourth Choice for American Consumers | p. 105 |
| Security Threats | p. 106 |
| Types of Cellular Fraud | p. 107 |
| Combating Fraud | p. 108 |
| General Security Principles | p. 110 |
| Inside GSM | p. 112 |
| GSM Security | p. 114 |
| GSM Algorithm Analysis | p. 119 |
| Inside CDMA | p. 122 |
| Why Not Use Public Keys for Cellular Authentication? | p. 123 |
| Cellular Network and Security--What Next? | p. 128 |
| The Future | p. 132 |
| Introduction to Wireless Data Networks | p. 135 |
| Cellular Digital Packet Data (CDPD) | p. 137 |
| CDPD Architecture | p. 138 |
| CDPD Security | p. 139 |
| Mobitex | p. 142 |
| Mobitex Architecture | p. 142 |
| Mobitex Security Architecture | p. 143 |
| General Packet Radio Service (GPRS) | p. 149 |
| GPRS Architecture | p. 152 |
| GPRS Security Issues | p. 154 |
| GPRS Security | p. 155 |
| Introducing the Wireless Application Protocol (WAP) | p. 159 |
| The WAP Device | p. 161 |
| The WAP Gateway | p. 162 |
| WAP Security Model | p. 163 |
| Conclusion | p. 166 |
| Wireless Standards and Technologies | p. 169 |
| Current and Future Technologies | p. 169 |
| Infrared | p. 170 |
| Radio | p. 170 |
| Spread Spectrum | p. 171 |
| OFDM | p. 172 |
| Current and Future Standards | p. 172 |
| IEEE 802 | p. 173 |
| 802.11 | p. 173 |
| The ABCs of 802.11 | p. 174 |
| 802.11b | p. 175 |
| 802.11a | p. 177 |
| 802.11g | p. 178 |
| 802.11j | p. 178 |
| 802.11h and 5GPP | p. 179 |
| 802.11e | p. 179 |
| 802.11i | p. 179 |
| 802.11f | p. 179 |
| IEEE 802.15 | p. 180 |
| IEEE 802.16 | p. 183 |
| IEEE 802.1x | p. 184 |
| ETSI | p. 184 |
| Bluetooth | p. 185 |
| HomeRF | p. 186 |
| Ultrawideband Radio (UWB) | p. 186 |
| Conclusion | p. 187 |
| Wireless Deployment Strategies | p. 189 |
| Implementing Wireless LANs: Security Considerations | p. 191 |
| Common Wireless Network Applications | p. 191 |
| Physical Securty Considerations | p. 192 |
| Network Security Considerations | p. 195 |
| Application Security Considerations | p. 200 |
| Enterprise Campus Designs | p. 200 |
| Enterprise Design 1 | p. 200 |
| Enterprise Design 2 | p. 201 |
| Enterprise Guest Network | p. 204 |
| Enterprise Point-to-Point Configuration | p. 205 |
| Wireless ISP Design | p. 207 |
| Retail and Manufacturing Designs | p. 207 |
| Kiosk/Roaming Agent Design | p. 208 |
| Warehouse Design | p. 210 |
| Small Office/Home Office Design (SOHO) | p. 211 |
| Conclusion | p. 213 |
| Enabling Secure Wireless Access to Data | p. 215 |
| Planning for Wireless Data--Important First Steps | p. 220 |
| Potential Wireless Application Scenarios | p. 222 |
| Wireless Policies | p. 228 |
| Wireless Logistics Policies | p. 229 |
| Wireless Security Policies | p. 230 |
| Conclusion | p. 234 |
| Real Examples from the Wireless World | p. 237 |
| Introduction to the Case Studies | p. 242 |
| Case Study 1 | p. 243 |
| Case Study 2 | p. 244 |
| Case Study 3 | p. 247 |
| Case Study 4 | p. 249 |
| Case Study 5 | p. 251 |
| Case Study 6 | p. 252 |
| Case Study Wrap-up: Key Characteristics | p. 254 |
| First Characteristic--Simplicity | p. 254 |
| Second Characteristic--Flexibility | p. 256 |
| Third Characteristic--Scalability | p. 256 |
| Fourth Characteristic--Holistic | p. 256 |
| Fifth Characteristic--Motivated User Base | p. 257 |
| Conclusion | p. 258 |
| The Wireless Future | p. 259 |
| Third-Generation (3G) Networks | p. 260 |
| Worldwide Status of 3G Networks as of 2002 | p. 262 |
| What about EDGE? | p. 264 |
| What Lies ahead for Wireless Operators? | p. 265 |
| But Wait, There's More--Introducing Fourth-Generation (4G) Networks | p. 267 |
| What Lies Ahead--Wireless Networking? | p. 270 |
| New Wireless Products | p. 273 |
| New Wireless Networking Markets | p. 273 |
| Two Worlds Collide | p. 274 |
| Looking Ahead--Key Issues | p. 275 |
| Wireless Wrap-Up | p. 277 |
| Conclusion | p. 279 |
| Assessing Wireless Local Area Networks (LANs) | p. 281 |
| Getting Started | p. 281 |
| Wireless Policy | p. 283 |
| Process | p. 283 |
| Information Gathering | p. 284 |
| What to Look For | p. 285 |
| Data Analysis | p. 286 |
| Organizing the Data | p. 286 |
| Mapping Out Coverage Areas | p. 286 |
| Follow Up | p. 287 |
| Validating Data and Taking Action | p. 288 |
| Ongoing Assessments | p. 289 |
| Emerging Markets | p. 291 |
| Conclusion | p. 291 |
| Glossary of Wireless Terms | p. 293 |
| Index | p. 311 |
| Table of Contents provided by Syndetics. All Rights Reserved. |