LEADER 01736nam 2200409Ia 450 001 9910697901403321 005 20081125105758.0 035 $a(CKB)5470000002391964 035 $a(OCoLC)276357978 035 $a(EXLCZ)995470000002391964 100 $a20081125d1993 ua 0 101 0 $aeng 135 $aurgn||||a|||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aGeohydrology and possible transport routes of polychlorinated biphenyls in Haiku Valley, Oahu, Hawaii$b[electronic resource] /$fby Scot K. Izuka ... [and others] ; prepared in cooperation with the U.S. Coast Guard, Civil Engineering Unit, Honolulu, Hawaii 210 1$aHonolulu, Hawaii :$cU.S. Dept. of the Interior, U.S. Geological Survey,$d1993. 215 $avi, 48 pages $cDJVU, image file 225 1 $aWater-resources investigations report ;$v92-4168 300 $aTitle from title screen (viewed Nov. 25, 2008). 320 $aIncludes bibliographical references (pages 45-48). 606 $aPolychlorinated biphenyls$xEnvironmental aspects 606 $aWater$xPollution$zHawaii$zOahu 606 $aSediment transport$xEnvironmental aspects$zHawaii$zOahu 615 0$aPolychlorinated biphenyls$xEnvironmental aspects. 615 0$aWater$xPollution 615 0$aSediment transport$xEnvironmental aspects 701 $aIzuka$b Scot K$01385066 712 02$aUnited States.$bCoast Guard.$bCivil Engineering Unit. 712 02$aGeological Survey (U.S.) 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910697901403321 996 $aGeohydrology and possible transport routes of polychlorinated biphenyls in Haiku Valley, Oahu, Hawaii$93518528 997 $aUNINA LEADER 12875nam 2200673 450 001 9910814414803321 005 20240219161759.0 010 $a1-119-08441-5 010 $a1-119-08440-7 024 7 $a10.1002/9781119084402 035 $a(CKB)4330000000008432 035 $a(EBL)4690021 035 $a(CaBNVSL)mat08040112 035 $a(IDAMS)0b00006485f0e4cd 035 $a(IEEE)8040112 035 $a(Au-PeEL)EBL4690021 035 $a(CaPaEBR)ebr11267158 035 $a(CaONFJC)MIL965344 035 $a(OCoLC)959149352 035 $a(CaSebORM)9781119084396 035 $a(MiAaPQ)EBC4690021 035 $a(PPN)197651577 035 $a(EXLCZ)994330000000008432 100 $a20171024d2008 uy 101 0 $aeng 135 $aur|n#---||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aWireless communications security $esolutions for the internet of things /$fJyrki T.J. Penttinen, Giesecke & Devrient, USA 205 $a1st edition 210 1$aThe Atrium, Southern Gates, Chichester, West Sussex, United Kingdom :$cJohn Wiley & Sons, Ltd,$d2017. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2016] 215 $a1 online resource (306 pages) 300 $aDescription based upon print version of record. 311 $a1-119-08442-3 311 $a1-119-08439-3 320 $aIncludes bibliographical references and index. 327 $a-- About the Author xii -- Preface xiii -- Acknowledgements xv -- Abbreviations xvi -- 1 Introduction 1 -- 1.1 Introduction 1 -- 1.2 Wireless Security 2 -- 1.2.1 Background and Advances 2 -- 1.2.2 Statistics 2 -- 1.2.3 Wireless Threats 4 -- 1.2.4 M2M Environment 9 -- 1.3 Standardization 10 -- 1.3.1 The Open Mobile Alliance (OMA) 10 -- 1.3.2 The International Organization for Standardization (ISO) 12 -- 1.3.3 The International Telecommunications Union (ITU) 14 -- 1.3.4 The European Telecommunications Standards Institute (ETSI) 14 -- 1.3.5 The Institute of Electrical and Electronics Engineers (IEEE) 15 -- 1.3.6 The Internet Engineering Task Force (IETF) 16 -- 1.3.7 The 3rd Generation Partnership Project (3GPP) 16 -- 1.3.8 The 3rd Generation Partnership Project 2 (3GPP2) 25 -- 1.3.9 The GlobalPlatform 25 -- 1.3.10 The SIMalliance 26 -- 1.3.11 The Smartcard Alliance 27 -- 1.3.12 The GSM Association (GSMA) 27 -- 1.3.13 The National Institute of Standards and Technology (NIST) 28 -- 1.3.14 The National Highway Transportation and Safety Administration (NHTSA) 28 -- 1.3.15 Other Standardization and Industry Forums 28 -- 1.3.16 The EMV Company (EMVCo) 29 -- 1.3.17 The Personal Computer/Smartcard (PC/SC) 29 -- 1.3.18 The Health Insurance Portability and Accountability Act (HIPAA) 29 -- 1.3.19 The Common Criteria (CC) 29 -- 1.3.20 The Evaluation Assurance Level (EAL) 30 -- 1.3.21 The Federal Information Processing Standards (FIPS) 31 -- 1.3.22 Biometric Standards 31 -- 1.3.23 Other Related Entities 32 -- 1.4 Wireless Security Principles 32 -- 1.4.1 General 32 -- 1.4.2 Regulation 33 -- 1.4.3 Security Architectures 33 -- 1.4.4 Algorithms and Security Principles 33 -- 1.5 Focus and Contents of the Book 36 -- References 38 -- 2 Security of Wireless Systems 42 -- 2.1 Overview 42 -- 2.1.1 Overall Security Considerations in the Mobile Environment 42 -- 2.1.2 Developing Security Threats 43 -- 2.1.3 RF Interferences and Safety 45 -- 2.2 Effects of Broadband Mobile Data 46 -- 2.2.1 Background 46. 327 $a2.2.2 The Role of Networks 47 -- 2.2.3 The Role of Apps 50 -- 2.2.4 UE Application Development 52 -- 2.2.5 Developers 55 -- 2.2.6 The Role of the SIM/UICC 56 -- 2.2.7 Challenges of Legislation 57 -- 2.2.8 Updating Standards 58 -- 2.2.9 3GPP System Evolution 58 -- 2.3 GSM 59 -- 2.3.1 The SIM 60 -- 2.3.2 Authentication and Authorization 62 -- 2.3.3 Encryption of the Radio Interface 63 -- 2.3.4 Encryption of IMSI 65 -- 2.3.5 Other GSM Security Aspects 65 -- 2.4 UMTS/HSPA 66 -- 2.4.1 Principles of 3G Security 66 -- 2.4.2 Key Utilization 68 -- 2.4.3 3G Security Procedures 69 -- 2.5 Long Term Evolution 71 -- 2.5.1 Protection and Security Principles 71 -- 2.5.2 X.509 Certificates and Public Key Infrastructure (PKI) 71 -- 2.5.3 IPsec and Internet Key Exchange (IKE) for LTE Transport Security 72 -- 2.5.4 Traffic Filtering 73 -- 2.5.5 LTE Radio Interface Security 74 -- 2.5.6 Authentication and Authorization 78 -- 2.5.7 LTE/SAE Service Security / Case Examples 79 -- 2.5.8 Multimedia Broadcast and Multicast Service (MBMS) and enhanced MBMS (eMBMS) 83 -- 2.6 Security Aspects of Other Networks 91 -- 2.6.1 CDMA (IS‐95) 91 -- 2.6.2 CDMA2000 93 -- 2.6.3 Broadcast Systems 94 -- 2.6.4 Satellite Systems 94 -- 2.6.5 Terrestrial Trunked Radio (TETRA) 95 -- 2.6.6 Wireless Local Area Network (WLAN) 96 -- 2.7 Interoperability 102 -- 2.7.1 Simultaneous Support for LTE/SAE and 2G/3G 102 -- 2.7.2 VoLTE 105 -- 2.7.3 CS Fallback 105 -- 2.7.4 Inter‐operator Security Aspects 106 -- 2.7.5 Wi‐Fi Networks and Offload 106 -- 2.7.6 Femtocell Architecture 108 -- References 109 -- 3 Internet of Things 112 -- 3.1 Overview 112 -- 3.2 Foundation 113 -- 3.2.1 Definitions 113 -- 3.2.2 Security Considerations of IoT 115 -- 3.2.3 The Role of IoT 115 -- 3.2.4 IoT Environment 117 -- 3.2.5 IoT Market 120 -- 3.2.6 Connectivity 121 -- 3.2.7 Regulation 122 -- 3.2.8 Security Risks 123 -- 3.2.9 Cloud 128 -- 3.2.10 Cellular Connectivity 129 -- 3.2.11 WLAN 133 -- 3.2.12 Low‐Range Systems 133 -- 3.3 Development of IoT 140. 327 $a3.3.1 GSMA Connected Living 140 -- 3.3.2 The GlobalPlatform 141 -- 3.3.3 Other Industry Forums 141 -- 3.4 Technical Description of IoT 142 -- 3.4.1 General 142 -- 3.4.2 Secure Communication Channels and Interfaces 143 -- 3.4.3 Provisioning and Key Derivation 144 -- 3.4.4 Use Cases 144 -- References 148 -- 4 Smartcards and Secure Elements 150 -- 4.1 Overview 150 -- 4.2 Role of Smartcards and SEs 151 -- 4.3 Contact Cards 153 -- 4.3.1 ISO/IEC 7816‐1 154 -- 4.3.2 ISO/IEC 7816‐2 155 -- 4.3.3 ISO/IEC 7816‐3 155 -- 4.3.4 ISO/IEC 7816‐4 157 -- 4.3.5 ISO/IEC 7816‐5 157 -- 4.3.6 ISO/IEC 7816‐6 157 -- 4.3.7 ISO/IEC 7816‐7 157 -- 4.3.8 ISO/IEC 7816‐8 157 -- 4.3.9 ISO/IEC 7816‐9 158 -- 4.3.10 ISO/IEC 7816‐10 158 -- 4.3.11 ISO/IEC 7816‐11 158 -- 4.3.12 ISO/IEC 7816‐12 158 -- 4.3.13 ISO/IEC 7816‐13 158 -- 4.3.14 ISO/IEC 7816‐15 158 -- 4.4 The SIM/UICC 159 -- 4.4.1 Terminology 159 -- 4.4.2 Principle 159 -- 4.4.3 Key Standards 160 -- 4.4.4 Form Factors 161 -- 4.5 Contents of the SIM 164 -- 4.5.1 UICC Building Blocks 164 -- 4.5.2 The SIM Application Toolkit (SAT) 167 -- 4.5.3 Contents of the UICC 168 -- 4.6 Embedded SEs 168 -- 4.6.1 Principle 168 -- 4.6.2 M2M Subscription Management 169 -- 4.6.3 Personalization 172 -- 4.6.4 M2M SIM Types 173 -- 4.7 Other Card Types 174 -- 4.7.1 Access Cards 174 -- 4.7.2 External SD Cards 175 -- 4.8 Contactless Cards 175 -- 4.8.1 ISO/IEC Standards 175 -- 4.8.2 NFC 176 -- 4.9 Electromechanical Characteristics of Smartcards 178 -- 4.9.1 HW Blocks 178 -- 4.9.2 Memory 178 -- 4.9.3 Environmental Classes 179 -- 4.10 Smartcard SW 181 -- 4.10.1 File Structure 181 -- 4.10.2 Card Commands 183 -- 4.10.3 Java Card 184 -- 4.11 UICC Communications 184 -- 4.11.1 Card Communications 184 -- 4.11.2 Remote File Management 185 -- References 186 -- 5 Wireless Payment and Access Systems 188 -- 5.1 Overview 188 -- 5.2 Wireless Connectivity as a Base for Payment and Access 188 -- 5.2.1 Barcodes 189 -- 5.2.2 RFID 191 -- 5.2.3 NFC 192 -- 5.2.4 Secure Element 196 -- 5.2.5 Tokenization 198. 327 $a5.3 E‐commerce 200 -- 5.3.1 EMV 200 -- 5.3.2 Google Wallet 200 -- 5.3.3 Visa 201 -- 5.3.4 American Express 201 -- 5.3.5 Square 201 -- 5.3.6 Other Bank Initiatives 201 -- 5.3.7 Apple Pay 201 -- 5.3.8 Samsung Pay 202 -- 5.3.9 MCX 202 -- 5.3.10 Comparison of Wallet Solutions 202 -- 5.4 Transport 203 -- 5.4.1 MiFare 204 -- 5.4.2 CiPurse 204 -- 5.4.3 Calypso 204 -- 5.4.4 FeliCa 205 -- 5.5 Other Secure Systems 205 -- 5.5.1 Mobile ID 205 -- 5.5.2 Personal Identity Verification 205 -- 5.5.3 Access Systems 206 -- References 206 -- 6 Wireless Security Platforms and Functionality 208 -- 6.1 Overview 208 -- 6.2 Forming the Base 208 -- 6.2.1 Secure Service Platforms 209 -- 6.2.2 SEs 209 -- 6.3 Remote Subscription Management 210 -- 6.3.1 SIM as a Basis for OTA 210 -- 6.3.2 TSM 212 -- 6.3.3 TEE 213 -- 6.3.4 HCE and the Cloud 216 -- 6.3.5 Comparison 219 -- 6.4 Tokenization 219 -- 6.4.1 PAN Protection 219 -- 6.4.2 HCE and Tokenization 221 -- 6.5 Other Solutions 221 -- 6.5.1 Identity Solutions 221 -- 6.5.2 Multi‐operator Environment 222 -- References 222 -- 7 Mobile Subscription Management 223 -- 7.1 Overview 223 -- 7.2 Subscription Management 223 -- 7.2.1 Development 223 -- 7.2.2 Benefits and Challenges of Subscription Management 225 -- 7.3 OTA Platforms 226 -- 7.3.1 General 226 -- 7.3.2 Provisioning Procedure 227 -- 7.3.3 SMS‐based SIM OTA 227 -- 7.3.4 HTTPS‐based SIM OTA 230 -- 7.3.5 Commercial Examples of SIM OTA Solutions 231 -- 7.4 Evolved Subscription Management 232 -- 7.4.1 GlobalPlatform 233 -- 7.4.2 SIMalliance 233 -- 7.4.3 OMA 233 -- 7.4.4 GSMA 235 -- References 240 -- 8 Security Risks in the Wireless Environment 242 -- 8.1 Overview 242 -- 8.2 Wireless Attack Types 243 -- 8.2.1 Cyber‐attacks 243 -- 8.2.2 Radio Jammers and RF Attacks 244 -- 8.2.3 Attacks against SEs 245 -- 8.2.4 IP Breaches 245 -- 8.2.5 UICC Module 246 -- 8.3 Security Flaws on Mobile Networks 247 -- 8.3.1 Potential Security Weaknesses of GSM 247 -- 8.3.2 Potential Security Weaknesses of 3G 254 -- 8.4 Protection Methods 254. 327 $a8.4.1 LTE Security 254 -- 8.4.2 Network Attack Types in LTE/SAE 255 -- 8.4.3 Preparation for the Attacks 256 -- 8.5 Errors in Equipment Manufacturing 259 -- 8.5.1 Equipment Ordering 259 -- 8.5.2 Early Testing 260 -- 8.6 Self‐Organizing Network Techniques for Test and Measurement 264 -- 8.6.1 Principle 264 -- 8.6.2 Self‐configuration 265 -- 8.6.3 Self‐optimizing 266 -- 8.6.4 Self‐healing 266 -- 8.6.5 Technical Issues and Impact on Network Planning 266 -- 8.6.6 Effects on Network Installation, Commissioning and Optimization 267 -- 8.6.7 SON and Security 268 -- References 268 -- 9 Monitoring and Protection Techniques 270 -- 9.1 Overview 270 -- 9.2 Personal Devices 271 -- 9.2.1 Wi‐Fi Connectivity 271 -- 9.2.2 Firewalls 271 -- 9.3 IP Core Protection Techniques 272 -- 9.3.1 General Principles 272 -- 9.3.2 LTE Packet Core Protection 272 -- 9.3.3 Protection against Roaming Threats 275 -- 9.4 HW Fault and Performance Monitoring 276 -- 9.4.1 Network Monitoring 277 -- 9.4.2 Protection against DoS/DDoS 277 -- 9.4.3 Memory Wearing 277 -- 9.5 Security Analysis 278 -- 9.5.1 Post‐processing 278 -- 9.5.2 Real‐time Security Analysis 278 -- 9.6 Virus Protection 279 -- 9.7 Legal Interception 281 -- 9.8 Personal Safety and Privacy 283 -- 9.8.1 CMAS 283 -- 9.8.2 Location Privacy 285 -- 9.8.3 Bio‐effects 286 -- References 287 -- 10 Future of Wireless Solutions and Security 288 -- 10.1 Overview 288 -- 10.2 IoT as a Driving Force 288 -- 10.3 Evolution of 4G 289 -- 10.4 Development of Devices 291 -- 10.4.1 Security Aspects of Smartcards 291 -- 10.4.2 Mobile Device Considerations 291 -- 10.4.3 IoT Device Considerations 292 -- 10.4.4 Sensor Networks and Big Data 293 -- 10.5 5G Mobile Communications 294 -- 10.5.1 Standardization 294 -- 10.5.2 Concept 295 -- 10.5.3 Industry and Investigation Initiatives 297 -- 10.5.4 Role of 5G in IoT 297 -- References 297 -- Index 299. 330 $aThis book describes the current and most probable future wireless security solutions. The focus is on the technical discussion of existing systems and new trends like Internet of Things (IoT). It also discusses existing and potential security threats, presents methods for protecting systems, operators and end-users, describes security systems attack types and the new dangers in the ever-evolving Internet. The book functions as a practical guide describing the evolvement of the wireless environment, and how to ensure the fluent continuum of the new functionalities, whilst minimizing the potential risks in network security. 606 $aWireless communication systems$xSecurity measures 606 $aInternet$xSecurity measures 606 $aComputer networks$xSecurity measures 615 0$aWireless communication systems$xSecurity measures. 615 0$aInternet$xSecurity measures. 615 0$aComputer networks$xSecurity measures. 676 $a005.8 700 $aPenttinen$b Jyrki T. J.$0861830 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910814414803321 996 $aWireless communications security$94127356 997 $aUNINA