Limit search to available items
Book Cover
E-book

Title LTE Security
Published John Wiley & Sons 2010
Online access available from:
Wiley Online Books    View Resource Record  

Copies

Description 1 online resource (304)
Contents Cover13; -- Contents -- Foreword -- Acknowledgements -- 1 Overview of the Book -- 2 Background -- 2.1 Evolution of Cellular Systems -- 2.1.1 Third-generation Network Architecture -- 2.1.2 Important Elements of the 3G Architecture -- 2.1.3 Functions and Protocols in the 3GPP System -- 2.1.4 The EPS System -- 2.2 Basic Security Concepts -- 2.2.1 Information Security -- 2.2.2 Design Principles -- 2.2.3 Communication Security Features -- 2.3 Basic Cryptographic Concepts -- 2.3.1 Cryptographic Functions -- 2.3.2 Securing Systems with Cryptographic Methods -- 2.3.3 Symmetric Encryption Methods -- 2.3.4 Hash Functions -- 2.3.5 Public-key Cryptography and PKI -- 2.3.6 Cryptanalysis -- 2.4 Introduction to LTE Standardization -- 2.4.1 Working Procedures in 3GPP -- 2.5 Notes on Terminology and Specification Language -- 2.5.1 Terminology -- 2.5.2 Specification Language -- 3 GSM Security -- 3.1 Principles of GSM Security -- 3.2 The Role of the SIM -- 3.3 Mechanisms of GSM Security -- 3.3.1 Subscriber Authentication in GSM -- 3.3.2 GSM Encryption -- 3.3.3 GPRS Encryption -- 3.3.4 Subscriber Identity Confidentiality -- 3.4 GSM Cryptographic Algorithms -- 4 Third-generation Security (UMTS) -- 4.1 Principles of Third-generation Security -- 4.1.1 Elements of GSM Security Carried Over to 3G -- 4.1.2 Weaknesses in GSM Security -- 4.1.3 Higher Level Objectives -- 4.2 Third-generation Security Mechanisms -- 4.2.1 Authentication and Key Agreement -- 4.2.2 Ciphering Mechanism -- 4.2.3 Integrity Protection Mechanism -- 4.2.4 Identity Confidentiality Mechanism -- 4.3 Third-generation Cryptographic Algorithms -- 4.3.1 KASUMI -- 4.3.2 UEA1 and UIA1 -- 4.3.3 SNOW3G, UEA2 and UIA2 -- 4.3.4 MILENAGE -- 4.3.5 Hash Functions -- 4.4 Interworking between GSM and 3G security -- 4.4.1 Interworking Scenarios -- 4.4.2 Cases with SIM -- 4.4.3 Cases with USIM -- 4.4.4 Handovers between GSM and 3G -- 4.5 Network Domain Security -- 4.5.1 Generic Security Domain Framework -- 4.5.2 Security Mechanisms for NDS -- 4.5.3 Application of NDS -- 5 3G8211;WLAN Interworking -- 5.1 Principles of 3G8211;WLAN Interworking -- 5.1.1 The General Idea -- 5.1.2 The EAP Framework -- 5.1.3 Overview of EAP-AKA -- 5.2 Security Mechanisms of 3G8211;WLAN Interworking -- 5.2.1 Reference Model for 3G8211;WLAN Interworking -- 5.2.2 Security Mechanisms of WLAN Direct IP Access -- 5.2.3 Security Mechanisms of WLAN 3GPP IP Access -- 5.3 Cryptographic Algorithms for 3G8211;WLAN Interworking -- 6 EPS Security Architecture -- 6.1 Overview and Relevant Specifications -- 6.1.1 Need for Security Standardization -- 6.1.2 Relevant Non-security Specifications -- 6.1.3 Security Specifications for EPS -- 6.2 Requirements and Features of EPS Security -- 6.2.1 Threats against EPS -- 6.2.2 EPS Security Features -- 6.2.3 How the Features Meet the Requirements -- 6.3 Design Decisions for EPS Security -- 6.4 Platform Security for Base Stations -- 6.4.1 General Security Considerations -- 6.4.2 Specification of Platform Security -- 6.4.3 Exposed Position and Threats -- 6.4.4 Security Requirements -- 7 EPS Authentication and Key Agreement -- 7.1 Identification -- 7.1.1 User Identity Confidentiality -- 7.1.2 Terminal Identity Confidentiality -- 7.2 The EPS Authentication and Key Agreement
Bibliography Includes bibliographical references
Subject Long-Term Evolution (Telecommunications)
Global system for mobile communications.
Global system for mobile communications.
Long-Term Evolution (Telecommunications)
Form Electronic book
Author Horn, G?nther.
Moeller, Wolf-Dietrich.
Niemi, Valtteri.
ISBN 9780470973288
0470973285
9780470973271
0470973277
1282783572
9781282783577
9781119991915
1119991919