LEADER 05203nam 2200709 450 001 9910816563003321 005 20231206231354.0 010 $a1-00-333939-5 010 $a1-000-79538-1 010 $a1-003-33939-5 010 $a1-000-79269-2 010 $a87-92982-86-7 035 $a(CKB)3710000000094819 035 $a(EBL)3400126 035 $a(SSID)ssj0001330130 035 $a(PQKBManifestationID)11714081 035 $a(PQKBTitleCode)TC0001330130 035 $a(PQKBWorkID)11327198 035 $a(PQKB)10417190 035 $a(Au-PeEL)EBL3400126 035 $a(CaPaEBR)ebr10852702 035 $a(OCoLC)878145269 035 $a(Au-PeEL)EBL7099483 035 $a(MiAaPQ)EBC3400126 035 $a(MiAaPQ)EBC7099483 035 $a(EXLCZ)993710000000094819 100 $a20230223d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity in next generation mobile networks $eSAE/LTE and WiMAX /$fAnand R. Prasad and Seung-Woo Seo 210 1$aGistrup, Denmark :$cRiver Publishers,$d[2011] 210 4$d©2011 215 $a1 online resource (242 p.) 225 1 $aRiver Publishers Series in Standardisation ;$vVolume 4 300 $aIncludes index. 311 $a87-92329-63-2 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $a""Cover""; ""Contents""; ""Dedication""; ""About the Authors""; ""Preface""; ""1 Introduction""; ""1.1 NGMN""; ""1.1.1 Overview""; ""1.1.2 Security Requirements""; ""1.2 Book Overview""; ""References""; ""2 Security Overview""; ""2.1 Objectives of Information Security""; ""2.1.1 Confidentiality""; ""2.1.2 Integrity""; ""2.1.3 Availability""; ""2.2 Types of Security Attacks""; ""2.2.1 Types of Attacks on Networks""; ""2.2.2 Security on Networks""; ""2.3 Basic Security Functions""; ""2.3.1 Authentication and Authorization""; ""2.3.2 Message Encryption""; ""2.3.3 Digital Signature"" 327 $a""2.3.4 Nonrepudiation""""2.3.5 Privacy Guarantee""; ""2.4 Cryptographic Primitives""; ""2.4.1 Symmetric-Key Cryptography Algorithm""; ""2.4.2 Hash Function and MAC""; ""2.4.3 Public-Key Cryptography Algorithm""; ""2.4.4 Random Number Generator""; ""2.4.5 Key Management""; ""2.4.6 Cryptographic Protocol""; ""2.4.7 Comments""; ""2.5 Extensible Authentication Protocol""; ""2.5.1 General EAP Architecture""; ""2.5.2 EAP Authentication Methods""; ""2.6 AAA Protocols""; ""2.6.1 RADIUS""; ""2.6.2 Diameter""; ""2.7 Conclusion""; ""References""; ""3 Standardization""; ""3.1 3GPP"" 327 $a""3.1.1 Organization""""3.1.2 Standardization Process""; ""3.1.3 Evolution: 3GPP Network and Security""; ""3.2 IEEE 802.16 and WiMAX""; ""3.2.1 IEEE 802.16 Standards""; ""3.2.2 WiMAX ForumA?®""; ""3.2.3 WiMAX Technology Evolution""; ""3.2.4 Security Overview in WiMAX""; ""References""; ""4 System Architecture and Long-Term Evolution Security""; ""4.1 Chapter Overview""; ""4.2 EPS System Overview""; ""4.2.1 Network Elements and Security Functions""; ""4.2.2 Protocol Layers and Security Functions""; ""4.3 Network Attachment""; ""4.4 Tracking Area""; ""4.5 Mobility"" 327 $a""4.6 Idle State Signaling Reduction""""4.7 EPS Identities""; ""4.8 Security Requirements""; ""4.9 Basic Points""; ""4.9.1 Key Hierarchy and Key Lifetime""; ""4.9.2 Security Contexts""; ""4.9.3 NAS Counts and Handling""; ""4.9.4 Cryptographic Algorithms and Usage Overview""; ""4.10 Authentication and Key Agreement (AKA)""; ""4.10.1 Basic Requirements""; ""4.10.2 Authentication Decision and Context Retrieval""; ""4.10.3 Authentication Procedure""; ""4.11 Algorithm Negotiation and Security Activation""; ""4.11.1 Algorithm Negotiation Requirements""; ""4.11.2 Non-access Stratum"" 327 $a""4.11.3 Access Stratum""""4.12 Key Handling at State Change""; ""4.13 Handover Key Handling""; ""4.14 Key Change On-The-Fly""; ""4.15 Connection Reestablishment: Token""; ""4.16 Local Authentication""; ""4.17 Inter-System Mobility""; ""4.17.1 Idle-Mode Mobility""; ""4.17.2 Handover""; ""4.18 Voice Call Continuity""; ""4.19 Emergency Call Security""; ""Bibliography""; ""5 Security in IEEE 802.16e/WiMAX""; ""5.1 Overview""; ""5.1.1 WiMAX Protocol Stack""; ""5.1.2 Architecture of WiMAX Security Sublayer""; ""5.2 Privacy Key Management""; ""5.2.1 Security Associations""; ""5.2.2 PKMv1"" 327 $a""5.2.3 PKMv2"" 330 $aThis book provides a fresh look at those security aspects, with main focus on the latest security developments of 3GPP SAE/LTE and WiMAX. SAE/LTE is also known as Evolved Packet System (EPS). 410 0$aRiver Publishers series of information science and technology ;$vVolume 4. 606 $aIEEE 802.16 (Standard) 606 $aLong-Term Evolution (Telecommunications) 615 0$aIEEE 802.16 (Standard) 615 0$aLong-Term Evolution (Telecommunications) 676 $a005.8 700 $aPrasad$b Anand$01625494 702 $aSo?$b Su?ng-u 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910816563003321 996 $aSecurity in next generation mobile networks$94046499 997 $aUNINA