Security in Next Generation Mobile Networks SAE LTE and Wimax 1st Edition by Anand Prasad, Seung Woo Seo – Ebook PDF Instant Download/Delivery: 8792982867, 9788792982865
Full download Security in Next Generation Mobile Networks SAE LTE and Wimax 1st Edition after payment
Product details:
ISBN 10: 8792982867
ISBN 13: 9788792982865
Author: Anand R. Prasad; Seung-Woo Seo
Starting from voice services with simple terminals, today a mobile device is nothing sort of a small PC in the form of smart-phones. The result has been a huge increase in data-services giving mobile communication access to critical aspects of human society / life. This has led to standardization of SAE/LTE (System Architecture Evolution / Long Term Evolution) by 3GPP and IEEE 802.16e / WiMAX. Together with penetration of mobile communications and new standardization come new security issues and thus the need for new security solutions. This book provides a fresh look at those security aspects, with main focus on the latest security developments of 3GPP SAE/LTE and WiMAX. SAE/LTE is also known as Evolved Packet System (EPS).The intended audience for this book is mobile network and device architects, designers, researchers and students. The goal of the authors, who have a combined experience of more than 25 years in mobile security standardization, architecture, research, and education, is to provide the book?s readers with a fresh and up-to-date look at the architecture and challenges of EPS and WiMAX security.
Table of contents:
1 Introduction
1.1 NGMN
1.1.1 Overview
1.1.2 Security Requirements
1.2 Book Overview
References
2 Security Overview
2.1 Objectives of Information Security
2.1.1 Confidentiality
2.1.2 Integrity
2.1.3 Availability
2.2 Types of Security Attacks
2.2.1 Types of Attacks on Networks
2.2.2 Security on Networks
2.3 Basic Security Functions
2.3.1 Authentication and Authorization
2.3.2 Message Encryption
2.3.3 Digital Signature
2.3.4 Nonrepudiation
2.3.5 Privacy Guarantee
2.4 Cryptographic Primitives
2.4.1 Symmetric-Key Cryptography Algorithm
2.4.2 Hash Function and MAC
2.4.3 Public-Key Cryptography Algorithm
2.4.4 Random Number Generator
2.4.5 Key Management
2.4.6 Cryptographic Protocol
2.4.7 Comments
2.5 Extensible Authentication Protocol
2.5.1 General EAP Architecture
2.5.2 EAP Authentication Methods
2.6 AAA Protocols
2.6.1 RADIUS
2.6.2 Diameter
2.7 Conclusion
References
3 Standardization
3.1 3GPP
3.1.1 Organization
3.1.2 Standardization Process
3.1.3 Evolution: 3GPP Network and Security
3.2 IEEE 802.16 and WiMAX
3.2.1 IEEE 802.16 Standards
3.2.2 WiMAX Forum®
3.2.3 WiMAX Technology Evolution
3.2.4 Security Overview in WiMAX
References
4 System Architecture and Long-Term Evolution Security
4.1 Chapter Overview
4.2 EPS System Overview
4.2.1 Network Elements and Security Functions
4.2.2 Protocol Layers and Security Functions
4.3 Network Attachment
4.4 Tracking Area
4.5 Mobility
4.6 Idle State Signaling Reduction
4.7 EPS Identities
4.8 Security Requirements
4.9 Basic Points
4.9.1 Key Hierarchy and Key Lifetime
4.9.2 Security Contexts
4.9.3 NAS Counts and Handling
4.9.4 Cryptographic Algorithms and Usage Overview
4.10 Authentication and Key Agreement (AKA)
4.10.1 Basic Requirements
4.10.2 Authentication Decision and Context Retrieval
4.10.3 Authentication Procedure
4.11 Algorithm Negotiation and Security Activation
4.11.1 Algorithm Negotiation Requirements
4.11.2 Non-access Stratum
4.11.3 Access Stratum
4.12 Key Handling at State Change
4.13 Handover Key Handling
4.14 Key Change On-The-Fly
4.15 Connection Reestablishment: Token
4.16 Local Authentication
4.17 Inter-System Mobility
4.17.1 Idle-Mode Mobility
4.17.2 Handover
4.18 Voice Call Continuity
4.19 Emergency Call Security
Bibliography
5 Security in IEEE 802.16e/WiMAX
5.1 Overview
5.1.1 WiMAX Protocol Stack
5.1.2 Architecture of WiMAX Security Sublayer
5.2 Privacy Key Management
5.2.1 Security Associations
5.2.2 PKMv1
5.2.3 PKMv2
5.3 Preauthentication and Handover Security
5.3.1 Handover Model
5.3.2 Preauthentication
5.4 WiMAX Network Architecture and Security Issues
5.4.1 Entity Definitions and Network Reference Model
5.4.2 Security of RPs in NRM
5.4.3 EAP-based Authentication
5.5 Threats and Solutions
5.5.1 Physical Layer Threats
5.5.2 MAC Layer Threats
5.6 Conclusions
References
6 Security for Other Systems
6.1 M2M Communications and Security
6.1.1 Introduction to Machine-to-Machine Communication
6.1.2 Use Cases
6.1.3 Security Issues on M2M Communications
6.1.4 Security Threats on M2M Communications
6.1.5 Security Requirements for M2M Communications
6.2 Femto: Home (Evolved) NodeB
6.2.1 General
6.2.2 System Architecture
6.2.3 Security Threats and Requirements
6.2.4 Solutions
6.3 Multimedia Broadcast and Multicast Service and Group Key Management
6.3.1 Multimedia Group Services
6.3.2 Multimedia Broadcast and Multicast Service
6.3.3 Group Key Management
6.4 Conclusion
People also search:
what is advanced mobile security
z+ security list
z+ security members
which mobile has best security
next generation security
Tags: Anand Prasad, Seung Woo Seo, Security, Generation, Mobile