Network Security in RWNs

  • Shengming Jiang


There are many security threats and attacks to the Internet (e.g., Fig.  1.29), which have caused immense economical cost and social damage. Therefore, network security becomes one of the upmost important issues, and is a key element of many critical applications. Due to the exposure and broadcast nature of wireless media, wireless networks are especially vulnerable to security attacks. This weakness is the major hurdle of further applying wireless networks into some important sectors. This chapter discusses fundamental network security technologies for wireless networks (The major references for this part include (Hunt, Total focus conferences, Singapore, 2003, [1], Boncella, Comput Secur (Elsevier) 9:269–282, 2002, [2], Hollingshead, 802.11 wireless security vs. basic network security principles 2004, [3])).


  1. 1.
    Hunt, R.: Network security \(-\) systems and architecture. In: Total Focus Conferences, Singapore. (2003). Accessed 26–27 March 2003
  2. 2.
    Boncella, R.J.: Wireless security: an overview. Comput. Secur. (Elsevier) 9, 269–282 (2002)Google Scholar
  3. 3.
    Hollingshead, T.: 802.11 wireless security vs. basic network security principles. SANS Institute 2004, available on WWW (2004)Google Scholar
  4. 4.
    The free encyclopedia: Wikipedia.
  5. 5.
    Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)CrossRefGoogle Scholar
  6. 6.
    Jiang, S.M.: Securing underwater acoustic networks: a survey. IEEE Commun. Surveys Tutor, Submitted (2017)Google Scholar
  7. 7.
    Rigney, C., Willens, S., Rubens, A., Simpson, W.: Remote authentication dial in user service (RADIUS). IETF RFC 2865 (2000)Google Scholar
  8. 8.
    DeKok, A., Lior, A.: Remote authentication dial-in user service (RADIUS) protocol extensions. IETF RFC 6929 (2013)Google Scholar
  9. 9.
    Simpson, W.: The point-to-point protocol (PPP). IETF RFC 1661 (1994)Google Scholar
  10. 10.
    Fajardo, V., Arkko, J., Loughney, J., Zorn, G.: Diameter base protocol. IETF RFC 6733 (2012)Google Scholar
  11. 11.
    Finseth, C.: An access control protocol, sometimes called TACACS. IETF RFC 1492 (1993)Google Scholar
  12. 12.
    Rescorla, E., Modadugu, N.: Datagram transport layer security version 1.2. IETF RFC 6347 (2012)Google Scholar
  13. 13.
    Stewart, R.: Stream control transmission protocol. IETF RFC 4960 (2007)Google Scholar
  14. 14.
    Freier, A., Karlton, P., Kocher, P.: The secure sockets layer (SSL) protocol version 3.0. IETF RFC 6101 (2011)Google Scholar
  15. 15.
    Dierks, T., Allen, C.: The transport layer security (TLS) protocol, version 1.2. IETF RFC 5246 (2008)Google Scholar
  16. 16.
    Krawczyk, H., Bellare, M., Canetti, R.: HMAC: keyed-hashing for message authentication. IETF RFC 2104 (1997)Google Scholar
  17. 17.
    Kent, S., Seo, K.: Security architecture for the internet protocol. IETF RFC 4301 (2005)Google Scholar
  18. 18.
    Bellovin, S.: Guidelines for specifying the use of IPsec version 2. IETF RFC 5406 (2009)Google Scholar
  19. 19.
    Kent, S.: IP authentication header. IETF RFC 4302 (2005)Google Scholar
  20. 20.
    Kent, S.: IP encapsulating security payload (ESP). IETF RFC 4303 (2005)Google Scholar
  21. 21.
    Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible authentication protocol (EAP). IETF RFC 3748 (2004)Google Scholar
  22. 22.
    Aboba, B., Simon, D.: PPP EAP TLS authentication protocol. IETF RFC 2716 (1999)Google Scholar
  23. 23.
    IEEE Std 802.1X, Port based network access control (2004)Google Scholar
  24. 24.
    IEEE Std 802.11i: Amendment 6: medium access control (MAC) security enhancements (2004)Google Scholar
  25. 25.
    IEEE Standard 802.1AE: IEEE standard for local and metropolitan area networks: media access control (MAC) Security (2006)Google Scholar
  26. 26.
    IEEE Std 802.11: Medium access control (MAC) sub layer and 3 physical layer specifications (1997)Google Scholar
  27. 27.
    Wi-Fi Alliance: Deploying wi-fi protected access (WPA\(^{\rm TM}\)) and WPA2\(^{\rm TM}\) in the enterprise (2005)Google Scholar
  28. 28.
    Heron, S.: Advanced Encryption Standard (AES). Netw. Secur. 2009, 8–12 (2009)CrossRefGoogle Scholar
  29. 29.
    Mangir, T.: IEEE 802.11i (PPT). (2007)
  30. 30.
    Chaplin, C., Qi, E., Ptasinski, H., Walker, J., Li, S.: 802.11i overview,. IEEE 802.11-04/0123r1 (2005)Google Scholar
  31. 31.
    Bellare, M., Kiliany, J., Rogaway, P.: The security of the cipher block chaining message authentication code. J. Comput. Syst. Sci. 61(3), 362–399 (2000)MathSciNetCrossRefGoogle Scholar
  32. 32.
    International Standard Organization (ISO): Information technology C security techniques C message authentication codes (MACs) C part 1: mechanisms using a block cipher, 1999, ISO/IEC 9797-1 (1999)Google Scholar
  33. 33.
    Whiting, D.,  Housley, R, Ferguson, N.: Counter with CBC-MAC (CCM). IETF RFC 3610 (2003)Google Scholar
  34. 34.
    Shin, M.H., Ma, J., Mishra, A., Arbaugh, W.A.: Wireless network security and interworking. Proc. IEEE 94(2), 455–466 (2006)CrossRefGoogle Scholar
  35. 35.
    Djenouri, D, Khelladi, L., Badache, A.N.: A survey of security issues in mobile ad hoc and sensor networks. IEEE Commun. Surv. Tutor. 7(4), 2–28 (2005) (Fourth Quarter)CrossRefGoogle Scholar
  36. 36.
    Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2014) (First Quarter)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Marine Internet Laboratory (MILAB), College of Information EngineeringShanghai Maritime UniversityShanghaiChina

Personalised recommendations