LEADER 03508nam 2200637 450 001 9910811059603321 005 20231206220922.0 010 $a1-00-333817-8 010 $a1-000-79328-1 010 $a1-003-33817-8 010 $a87-92982-99-9 010 $a9788792982858 035 $a(CKB)3710000000094828 035 $a(EBL)3400135 035 $a(SSID)ssj0001327496 035 $a(PQKBManifestationID)11774574 035 $a(PQKBTitleCode)TC0001327496 035 $a(PQKBWorkID)11270901 035 $a(PQKB)10822139 035 $a(Au-PeEL)EBL3400135 035 $a(CaPaEBR)ebr10852711 035 $a(OCoLC)878145290 035 $a(Au-PeEL)EBL7099423 035 $a(MiAaPQ)EBC3400135 035 $a(MiAaPQ)EBC7099423 035 $a(EXLCZ)993710000000094828 100 $a20230225d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aFemtocells $esecure communication and networking /$fMarcus Wong 210 1$aAalborg, Denmark :$cRiver Publishers,$d[2013] 210 4$dİ2013 215 $a1 online resource (228 p.) 225 1 $aRiver Publishers Series in Communications 300 $aDescription based upon print version of record. 311 $a87-92982-85-9 320 $aIncludes bibliographical references. 327 $a""Cover""; ""Contents""; ""Preface""; ""I: Getting Started""; ""1 Introduction""; ""1.1 1G and Analog Systems""; ""1.2 2G Systems""; ""1.3 3G""; ""1.4 4G""; ""1.5 Femtocells""; ""2 3GPP Architecture and the Femtocell""; ""2.1 UMTS Architecture""; ""2.2 LTE""; ""2.3 Femtocells and Femtocell Architecture""; ""II: Securing the Femtocells""; ""3 Security of Femtocells""; ""3.1 UMTS and LTE Security""; ""3.2 Femtocell Security""; ""3.3 Case Study on Attacks of the Femtocells""; ""4 CDMA Femtocells""; ""4.1 Variations in CDMA Femto Architecture""; ""4.2 CDMA Femtocell Security"" 327 $a""4.3 Security Mechanisms and Procedures""""4.4 Differences between CDMA and UMTS/LTE Femtocells""; ""5 WiMAX Femtocells""; ""5.1 WiMAX Architecture and the Femto""; ""5.2 WiMAX Femto Functional Components""; ""5.3 WiMAX Femto Security Features and Mechanisms""; ""5.4 Differences between WiMAX and 3GPP/CDMA Femtocells""; ""6 LIPA and SIPTO""; ""6.1 Security Considerations in LIPA and SIPTO""; ""6.2 In Short""; ""7 Security Profiles and IKEv2 Call Flow""; ""7.1 Security Profiles""; ""7.2 IKEv2 Example Call Flow Used in 3GPP""; ""III: From Femtocells to Small Cells"" 327 $a""8 From Femtocells to Small Cells""""8.1 Small Cells""; ""8.2 Small Cells and Wi-Fi""; ""IV: Outlook and Concluding Remarks""; ""9 Conclusion and Outlook""; ""Annex""; ""A.1 Sample of TR-069 FMS Security Related Parameters""; ""A.2 WiMAX SON""; ""A.3 CDMA2000 Authentication""; ""A.3.1 Global Challenge""; ""A.3.2 Unique Challenge""; ""Glossary""; ""Bibliography""; ""About the Author"" 330 $aA considerable amount of effort has been devoted, both in industry forums and standards developing organizations, towards creating technical specifications for the architecture, operational, and security of the Femtocells. 410 0$aRiver Publishers series in communications. 606 $aFemtocells 615 0$aFemtocells. 676 $a621.3821 700 $aWong$b Marcus$01616450 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910811059603321 996 $aFemtocells$93947143 997 $aUNINA