top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
5G explained : security and deployment of advanced mobile communications / / Jyrki T.J. Penttinen
5G explained : security and deployment of advanced mobile communications / / Jyrki T.J. Penttinen
Autore Penttinen Jyrki T. J.
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey, USA : , : John Wiley & Sons, Inc., , 2019
Descrizione fisica 1 online resource (418 pages)
Disciplina 621.3845/6
Soggetto topico Global system for mobile communications - Security measures
Global system for mobile communications - Technological innovation
Soggetto genere / forma Electronic books.
ISBN 1-119-27570-9
1-119-27573-3
1-119-27569-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Table of Contents; Author Biography; Preface; Acknowledgments; Abbreviation List; 1 Introduction; 1.1 Overview; 1.2 What Is 5G?; 1.3 Background; 1.4 Research; 1.5 Challenges for Electronics; 1.6 Expected 5G in Practice; 1.7 5G and Security; 1.8 Motivations; 1.9 5G Standardization and Regulation; 1.10 Global Standardization in 5G Era; 1.11 Introduction to the Book; References; 2 Requirements; 2.1 Overview; 2.2 Background; 2.3 5G Requirements Based on ITU; 2.4 The Technical Specifications of 3GPP; 2.5 NGMN; 2.6 Mobile Network Operators; 2.7 Mobile Device Manufacturers; References
3 Positioning of 5G3.1 Overview; 3.2 Mobile Generations; 3.3 The Role of 3GPP in LPWA and IoT; 3.4 The Role of 5G in Automotive (V2X); 3.5 The Role of 5G in the Cyber-World; References; 4 Architecture; 4.1 Overview; 4.2 Architecture; 4.3 Renewed Functionality of the 5G System; 4.4 Supporting Solutions for 5G; 4.5 Control and User Plane Separation of EPC Nodes (CUPS); References; 5 Radio Network; 5.1 Overview; 5.2 5G Performance; 5.3 5G Spectrum; 5.4 5G Radio Access Technologies; 5.5 Uplink OFDM of 5G: CP-OFDM and DFT-s-OFDM; 5.6 Downlink; 5.7 New Radio (NR) Interface of 3GPP; 5.8 User Devices
5.9 Other Aspects5.10 CBRS; References; 6 Core Network; 6.1 Overview; 6.2 Preparing the Core for 5G; 6.3 5G Core Network Elements; 6.4 5G Functionalities Implemented in 5G Core; 6.5 Transport Network; 6.6 Protocols and Interfaces; 6.7 5G Core Network Services; References; 7 Services and Applications; 7.1 Overview; 7.2 5G Services; 7.3 Network Function-Related Cases; 7.4 Vehicle Communications; 7.5 Machine Learning and Artificial Intelligence; References; 8 Security; 8.1 Overview; 8.2 5G Security Threats and Challenges; 8.3 Development
8.4 Security Implications in 5G Environments and Use Cases8.5 5G Security Layers; 8.6 Device Security; 8.7 Security Between Network Entities; 8.8 Security Opportunities for Stakeholders; 8.9 5G Security Architecture for 3GPP Networks; 8.10 UICC Evolution; 8.11 5G Security Development; 8.12 UICC Variants; References; 9 5G Network Planning and Optimization; 9.1 Overview; 9.2 5G Core and Transmission Network Dimensioning; 9.3 5G Radio Network Planning; References; 10 Deployment; 10.1 Overview; 10.2 Trials and Early Adopters Prior to 2020; 10.3 5G Frequency Bands
10.4 Core and Radio Network Deployment Scenarios10.5 Standalone and Non-Standalone Deployment Scenarios; 10.6 5G Network Interfaces and Elements; 10.7 Core Deployment; 10.8 CoMP; 10.9 Measurements; References; Index; End User License Agreement
Altri titoli varianti Five G explained
Record Nr. UNINA-9910467355903321
Penttinen Jyrki T. J.  
Hoboken, New Jersey, USA : , : John Wiley & Sons, Inc., , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
5G explained : security and deployment of advanced mobile communications / / Jyrki T.J. Penttinen
5G explained : security and deployment of advanced mobile communications / / Jyrki T.J. Penttinen
Autore Penttinen Jyrki T. J.
Edizione [First edition]
Pubbl/distr/stampa Hoboken, New Jersey, USA : , : John Wiley & Sons, Inc., , 2019
Descrizione fisica 1 online resource (418 pages)
Disciplina 621.3845/6
Collana THEi Wiley ebooks.
Soggetto topico Global system for mobile communications - Security measures
Global system for mobile communications - Technological innovation
ISBN 1-119-27570-9
1-119-27573-3
1-119-27569-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Table of Contents; Author Biography; Preface; Acknowledgments; Abbreviation List; 1 Introduction; 1.1 Overview; 1.2 What Is 5G?; 1.3 Background; 1.4 Research; 1.5 Challenges for Electronics; 1.6 Expected 5G in Practice; 1.7 5G and Security; 1.8 Motivations; 1.9 5G Standardization and Regulation; 1.10 Global Standardization in 5G Era; 1.11 Introduction to the Book; References; 2 Requirements; 2.1 Overview; 2.2 Background; 2.3 5G Requirements Based on ITU; 2.4 The Technical Specifications of 3GPP; 2.5 NGMN; 2.6 Mobile Network Operators; 2.7 Mobile Device Manufacturers; References
3 Positioning of 5G3.1 Overview; 3.2 Mobile Generations; 3.3 The Role of 3GPP in LPWA and IoT; 3.4 The Role of 5G in Automotive (V2X); 3.5 The Role of 5G in the Cyber-World; References; 4 Architecture; 4.1 Overview; 4.2 Architecture; 4.3 Renewed Functionality of the 5G System; 4.4 Supporting Solutions for 5G; 4.5 Control and User Plane Separation of EPC Nodes (CUPS); References; 5 Radio Network; 5.1 Overview; 5.2 5G Performance; 5.3 5G Spectrum; 5.4 5G Radio Access Technologies; 5.5 Uplink OFDM of 5G: CP-OFDM and DFT-s-OFDM; 5.6 Downlink; 5.7 New Radio (NR) Interface of 3GPP; 5.8 User Devices
5.9 Other Aspects5.10 CBRS; References; 6 Core Network; 6.1 Overview; 6.2 Preparing the Core for 5G; 6.3 5G Core Network Elements; 6.4 5G Functionalities Implemented in 5G Core; 6.5 Transport Network; 6.6 Protocols and Interfaces; 6.7 5G Core Network Services; References; 7 Services and Applications; 7.1 Overview; 7.2 5G Services; 7.3 Network Function-Related Cases; 7.4 Vehicle Communications; 7.5 Machine Learning and Artificial Intelligence; References; 8 Security; 8.1 Overview; 8.2 5G Security Threats and Challenges; 8.3 Development
8.4 Security Implications in 5G Environments and Use Cases8.5 5G Security Layers; 8.6 Device Security; 8.7 Security Between Network Entities; 8.8 Security Opportunities for Stakeholders; 8.9 5G Security Architecture for 3GPP Networks; 8.10 UICC Evolution; 8.11 5G Security Development; 8.12 UICC Variants; References; 9 5G Network Planning and Optimization; 9.1 Overview; 9.2 5G Core and Transmission Network Dimensioning; 9.3 5G Radio Network Planning; References; 10 Deployment; 10.1 Overview; 10.2 Trials and Early Adopters Prior to 2020; 10.3 5G Frequency Bands
10.4 Core and Radio Network Deployment Scenarios10.5 Standalone and Non-Standalone Deployment Scenarios; 10.6 5G Network Interfaces and Elements; 10.7 Core Deployment; 10.8 CoMP; 10.9 Measurements; References; Index; End User License Agreement
Altri titoli varianti Five G explained
Record Nr. UNINA-9910542291703321
Penttinen Jyrki T. J.  
Hoboken, New Jersey, USA : , : John Wiley & Sons, Inc., , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
5G explained : security and deployment of advanced mobile communications / / Jyrki T.J. Penttinen
5G explained : security and deployment of advanced mobile communications / / Jyrki T.J. Penttinen
Autore Penttinen Jyrki T. J.
Edizione [First edition]
Pubbl/distr/stampa Hoboken, New Jersey, USA : , : John Wiley & Sons, Inc., , 2019
Descrizione fisica 1 online resource (418 pages)
Disciplina 621.3845/6
Collana THEi Wiley ebooks.
Soggetto topico Global system for mobile communications - Security measures
Global system for mobile communications - Technological innovation
ISBN 1-119-27570-9
1-119-27573-3
1-119-27569-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Table of Contents; Author Biography; Preface; Acknowledgments; Abbreviation List; 1 Introduction; 1.1 Overview; 1.2 What Is 5G?; 1.3 Background; 1.4 Research; 1.5 Challenges for Electronics; 1.6 Expected 5G in Practice; 1.7 5G and Security; 1.8 Motivations; 1.9 5G Standardization and Regulation; 1.10 Global Standardization in 5G Era; 1.11 Introduction to the Book; References; 2 Requirements; 2.1 Overview; 2.2 Background; 2.3 5G Requirements Based on ITU; 2.4 The Technical Specifications of 3GPP; 2.5 NGMN; 2.6 Mobile Network Operators; 2.7 Mobile Device Manufacturers; References
3 Positioning of 5G3.1 Overview; 3.2 Mobile Generations; 3.3 The Role of 3GPP in LPWA and IoT; 3.4 The Role of 5G in Automotive (V2X); 3.5 The Role of 5G in the Cyber-World; References; 4 Architecture; 4.1 Overview; 4.2 Architecture; 4.3 Renewed Functionality of the 5G System; 4.4 Supporting Solutions for 5G; 4.5 Control and User Plane Separation of EPC Nodes (CUPS); References; 5 Radio Network; 5.1 Overview; 5.2 5G Performance; 5.3 5G Spectrum; 5.4 5G Radio Access Technologies; 5.5 Uplink OFDM of 5G: CP-OFDM and DFT-s-OFDM; 5.6 Downlink; 5.7 New Radio (NR) Interface of 3GPP; 5.8 User Devices
5.9 Other Aspects5.10 CBRS; References; 6 Core Network; 6.1 Overview; 6.2 Preparing the Core for 5G; 6.3 5G Core Network Elements; 6.4 5G Functionalities Implemented in 5G Core; 6.5 Transport Network; 6.6 Protocols and Interfaces; 6.7 5G Core Network Services; References; 7 Services and Applications; 7.1 Overview; 7.2 5G Services; 7.3 Network Function-Related Cases; 7.4 Vehicle Communications; 7.5 Machine Learning and Artificial Intelligence; References; 8 Security; 8.1 Overview; 8.2 5G Security Threats and Challenges; 8.3 Development
8.4 Security Implications in 5G Environments and Use Cases8.5 5G Security Layers; 8.6 Device Security; 8.7 Security Between Network Entities; 8.8 Security Opportunities for Stakeholders; 8.9 5G Security Architecture for 3GPP Networks; 8.10 UICC Evolution; 8.11 5G Security Development; 8.12 UICC Variants; References; 9 5G Network Planning and Optimization; 9.1 Overview; 9.2 5G Core and Transmission Network Dimensioning; 9.3 5G Radio Network Planning; References; 10 Deployment; 10.1 Overview; 10.2 Trials and Early Adopters Prior to 2020; 10.3 5G Frequency Bands
10.4 Core and Radio Network Deployment Scenarios10.5 Standalone and Non-Standalone Deployment Scenarios; 10.6 5G Network Interfaces and Elements; 10.7 Core Deployment; 10.8 CoMP; 10.9 Measurements; References; Index; End User License Agreement
Altri titoli varianti Five G explained
Record Nr. UNINA-9910828550103321
Penttinen Jyrki T. J.  
Hoboken, New Jersey, USA : , : John Wiley & Sons, Inc., , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
5G second phase explained : the 3GPP release 16 enhancements / / Jyrki Teppo Juho Penttinen
5G second phase explained : the 3GPP release 16 enhancements / / Jyrki Teppo Juho Penttinen
Autore Penttinen Jyrki T. J.
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2021]
Descrizione fisica 1 online resource (315 pages)
Disciplina 621.3845/6
Soggetto topico 5G mobile communication systems
Long-Term Evolution (Telecommunications)
ISBN 1-119-64553-0
1-119-64555-7
1-119-64556-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910830059303321
Penttinen Jyrki T. J.  
Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The LTE/SAE deployment handbook / / Jyrki Penttinen
The LTE/SAE deployment handbook / / Jyrki Penttinen
Autore Penttinen Jyrki T. J.
Edizione [1]
Pubbl/distr/stampa Chichester, West Sussex ; , : , , 2012
Descrizione fisica 1 online resource (447 p.)
Disciplina 621.3845/6
Altri autori (Persone) PenttinenJyrki T. J
Soggetto topico Long-Term Evolution (Telecommunications)
System Architecture Evolution (Telecommunications)
ISBN 1-119-96111-4
1-283-40485-0
9786613404855
1-119-95418-5
1-119-95417-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto List of Contributors xv -- Foreword xvii -- Preface xix -- Acknowledgments xxi -- Glossary xxiii -- 1 General 1 -- 1.1 Introduction 1 -- 1.2 The LTE Scene 1 -- 1.3 The Role of LTE in Mobile Communications 2 -- 1.4 LTE/SAE Deployment Process 3 -- 1.5 The Contents of the Book 7 -- References 9 -- 2 Drivers for LTE/SAE 11 -- 2.1 Introduction 11 -- 2.2 Mobile System Generations 11 -- 2.3 Data Service Evolution 14 -- 2.4 Reasons for the Deployment of LTE 19 -- 2.5 Next Steps of LTE/SAE 20 -- 2.6 Summary of the Benefits of LTE 21 -- References 21 -- 3 LTE/SAE Overview 23 -- 3.1 Introduction 23 -- 3.2 LTE/SAE Standards 24 -- 3.3 How to Find Information from Specs? 25 -- 3.4 Evolution Path Towards LTE 27 -- 3.5 Key Parameters of LTE 28 -- 3.6 LTE vs WiMAX 29 -- 3.7 Models for Roaming Architecture 29 -- 3.8 LTE/SAE Services 36 -- 3.9 LTE-Advanced -- Next Generation LTE 40 -- References 42 -- 4 Performance Requirements 45 -- 4.1 Introduction 45 -- 4.2 LTE Key Features 45 -- 4.3 Standards LTE Requirements 49 -- 4.4 Effects of the Requirements on the LTE/SAE Network Deployment 60 -- References 62 -- 5 LTE and SAE Architecture 63 -- 5.1 Introduction 63 -- 5.2 Elements 63 -- 5.3 Interfaces 70 -- 5.4 Protocol Stacks 71 -- 5.5 Layer 2 Structure 75 -- References 77 -- 6 Transport and Core Network 79 -- 6.1 Introduction 79 -- 6.2 Functionality of Transport Elements 79 -- 6.3 Transport Network 83 -- 6.4 Core Network 85 -- 6.5 IP Multimedia Subsystem 86 -- References 93 -- 7 LTE Radio Network 95 -- 7.1 Introduction 95 -- 7.2 LTE Radio Interface 95 -- 7.3 LTE Spectrum 96 -- 7.4 OFDM and OFDMA 96 -- 7.5 SC-FDM and SC-FDMA 107 -- 7.6 Reporting 108 -- 7.7 LTE Radio Resource Management 111 -- 7.8 RRM Principles and Algorithms Common to UL and DL 113 -- 7.9 Uplink RRM 123 -- 7.10 Downlink RRM 128 -- 7.11 Intra-LTE Handover 132 -- References 134 -- 8 Terminals and Applications 137 -- 8.1 Introduction 137 -- 8.2 Effect of Smartphones on LTE 137 -- 8.3 Interworking 139 -- 8.4 LTE Terminal Requirements 143.
8.5 LTE Applications 149 -- References 155 -- 9 Voice Over LTE 157 -- 9.1 Introduction 157 -- 9.2 CS Fallback for Evolved Packet System 158 -- 9.3 SMS Over SGs 159 -- 9.4 Voice and Other CS Services than SMS 164 -- 9.5 Voice and SMS Over IP 169 -- 9.6 Summary 186 -- References 187 -- 10 Functionality of LTE/SAE 189 -- 10.1 Introduction 189 -- 10.2 States 189 -- 10.3 End-to-End Functionality 199 -- 10.4 LTE/SAE Roaming 200 -- 10.5 Charging 216 -- References 219 -- 11 LTE/SAE Security 221 -- 11.1 Introduction 221 -- 11.2 LTE Security Risk Identification 222 -- 11.3 LTE/SAE Service Security -- Case Example 234 -- 11.4 Authentication and Authorization 238 -- 11.5 Customer Data Safety 239 -- 11.6 Lawful Interception 239 -- References 242 -- 12 Planning and Deployment of SAE 243 -- 12.1 Introduction 243 -- 12.2 Network Evolution from 2G/3G PS Core to EPC 243 -- 12.3 Entering Commercial Phase: Support for Multi-Mode LTE/3G/2G Terminals with Pre-Release 8 SGSN 245 -- 12.4 SGSN/MME Evolution 248 -- 12.5 Case Example: Commercial SGSN/MME Offering 249 -- 12.6 Mobile Gateway Evolution 250 -- 12.7 Case Example: Commercial GGSN/S-GW/P-GW Offering 251 -- 12.8 EPC Network Deployment and Topology Considerations 252 -- 12.9 LTE Access Dimensioning 254 -- 13 Radio Network Planning 257 -- 13.1 Introduction 257 -- 13.2 Radio Network Planning Process 257 -- 13.3 Nominal Network Planning 260 -- 13.4 Capacity Planning 263 -- 13.5 Coverage Planning 264 -- 13.6 Self-Optimizing Network 271 -- Reference 272 -- 14 LTE/SAE Measurements 273 -- 14.1 Introduction 273 -- 14.2 General 273 -- 14.3 Principles of Radio Interface Measurements 273 -- 14.4 LTE Field Measurements 282 -- 14.5 Evolution Changes the Rules of Testing 289 -- 14.6 General Test Requirements and Methods for the LTE Air Interface 292 -- 14.7 Test Requirements in SAE 298 -- 14.8 Throughput Testing 300 -- 14.9 Self-Organizing Network Techniques for Test and Measurement 306 -- 14.10 Field Testing 309 -- References 323 -- 15 Recommendations 325.
15.1 Introduction 325 -- 15.2 Transition to LTE -- Use Cases 326 -- 15.3 Spectrum Aspects 327 -- 15.4 Effect of the Advanced GSM Features on the Fluent LTE Deployment 343 -- 15.5 Alternative Network Migration Path (Multi-Operator Case) 367 -- 15.6 Hardware Migration Path 376 -- 15.7 Mobile Backhaul -- Towards "All-IP" Transport 381 -- 15.8 LTE Interworking with Legacy Networks for the Optimal Voice and Data Services 384 -- References 405 -- Index 407.
Record Nr. UNINA-9910139744203321
Penttinen Jyrki T. J.  
Chichester, West Sussex ; , : , , 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The LTE/SAE deployment handbook / / Jyrki Penttinen
The LTE/SAE deployment handbook / / Jyrki Penttinen
Autore Penttinen Jyrki T. J.
Edizione [1]
Pubbl/distr/stampa Chichester, West Sussex ; , : , , 2012
Descrizione fisica 1 online resource (447 p.)
Disciplina 621.3845/6
Altri autori (Persone) PenttinenJyrki T. J
Soggetto topico Long-Term Evolution (Telecommunications)
System Architecture Evolution (Telecommunications)
ISBN 1-119-96111-4
1-283-40485-0
9786613404855
1-119-95418-5
1-119-95417-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto List of Contributors xv -- Foreword xvii -- Preface xix -- Acknowledgments xxi -- Glossary xxiii -- 1 General 1 -- 1.1 Introduction 1 -- 1.2 The LTE Scene 1 -- 1.3 The Role of LTE in Mobile Communications 2 -- 1.4 LTE/SAE Deployment Process 3 -- 1.5 The Contents of the Book 7 -- References 9 -- 2 Drivers for LTE/SAE 11 -- 2.1 Introduction 11 -- 2.2 Mobile System Generations 11 -- 2.3 Data Service Evolution 14 -- 2.4 Reasons for the Deployment of LTE 19 -- 2.5 Next Steps of LTE/SAE 20 -- 2.6 Summary of the Benefits of LTE 21 -- References 21 -- 3 LTE/SAE Overview 23 -- 3.1 Introduction 23 -- 3.2 LTE/SAE Standards 24 -- 3.3 How to Find Information from Specs? 25 -- 3.4 Evolution Path Towards LTE 27 -- 3.5 Key Parameters of LTE 28 -- 3.6 LTE vs WiMAX 29 -- 3.7 Models for Roaming Architecture 29 -- 3.8 LTE/SAE Services 36 -- 3.9 LTE-Advanced -- Next Generation LTE 40 -- References 42 -- 4 Performance Requirements 45 -- 4.1 Introduction 45 -- 4.2 LTE Key Features 45 -- 4.3 Standards LTE Requirements 49 -- 4.4 Effects of the Requirements on the LTE/SAE Network Deployment 60 -- References 62 -- 5 LTE and SAE Architecture 63 -- 5.1 Introduction 63 -- 5.2 Elements 63 -- 5.3 Interfaces 70 -- 5.4 Protocol Stacks 71 -- 5.5 Layer 2 Structure 75 -- References 77 -- 6 Transport and Core Network 79 -- 6.1 Introduction 79 -- 6.2 Functionality of Transport Elements 79 -- 6.3 Transport Network 83 -- 6.4 Core Network 85 -- 6.5 IP Multimedia Subsystem 86 -- References 93 -- 7 LTE Radio Network 95 -- 7.1 Introduction 95 -- 7.2 LTE Radio Interface 95 -- 7.3 LTE Spectrum 96 -- 7.4 OFDM and OFDMA 96 -- 7.5 SC-FDM and SC-FDMA 107 -- 7.6 Reporting 108 -- 7.7 LTE Radio Resource Management 111 -- 7.8 RRM Principles and Algorithms Common to UL and DL 113 -- 7.9 Uplink RRM 123 -- 7.10 Downlink RRM 128 -- 7.11 Intra-LTE Handover 132 -- References 134 -- 8 Terminals and Applications 137 -- 8.1 Introduction 137 -- 8.2 Effect of Smartphones on LTE 137 -- 8.3 Interworking 139 -- 8.4 LTE Terminal Requirements 143.
8.5 LTE Applications 149 -- References 155 -- 9 Voice Over LTE 157 -- 9.1 Introduction 157 -- 9.2 CS Fallback for Evolved Packet System 158 -- 9.3 SMS Over SGs 159 -- 9.4 Voice and Other CS Services than SMS 164 -- 9.5 Voice and SMS Over IP 169 -- 9.6 Summary 186 -- References 187 -- 10 Functionality of LTE/SAE 189 -- 10.1 Introduction 189 -- 10.2 States 189 -- 10.3 End-to-End Functionality 199 -- 10.4 LTE/SAE Roaming 200 -- 10.5 Charging 216 -- References 219 -- 11 LTE/SAE Security 221 -- 11.1 Introduction 221 -- 11.2 LTE Security Risk Identification 222 -- 11.3 LTE/SAE Service Security -- Case Example 234 -- 11.4 Authentication and Authorization 238 -- 11.5 Customer Data Safety 239 -- 11.6 Lawful Interception 239 -- References 242 -- 12 Planning and Deployment of SAE 243 -- 12.1 Introduction 243 -- 12.2 Network Evolution from 2G/3G PS Core to EPC 243 -- 12.3 Entering Commercial Phase: Support for Multi-Mode LTE/3G/2G Terminals with Pre-Release 8 SGSN 245 -- 12.4 SGSN/MME Evolution 248 -- 12.5 Case Example: Commercial SGSN/MME Offering 249 -- 12.6 Mobile Gateway Evolution 250 -- 12.7 Case Example: Commercial GGSN/S-GW/P-GW Offering 251 -- 12.8 EPC Network Deployment and Topology Considerations 252 -- 12.9 LTE Access Dimensioning 254 -- 13 Radio Network Planning 257 -- 13.1 Introduction 257 -- 13.2 Radio Network Planning Process 257 -- 13.3 Nominal Network Planning 260 -- 13.4 Capacity Planning 263 -- 13.5 Coverage Planning 264 -- 13.6 Self-Optimizing Network 271 -- Reference 272 -- 14 LTE/SAE Measurements 273 -- 14.1 Introduction 273 -- 14.2 General 273 -- 14.3 Principles of Radio Interface Measurements 273 -- 14.4 LTE Field Measurements 282 -- 14.5 Evolution Changes the Rules of Testing 289 -- 14.6 General Test Requirements and Methods for the LTE Air Interface 292 -- 14.7 Test Requirements in SAE 298 -- 14.8 Throughput Testing 300 -- 14.9 Self-Organizing Network Techniques for Test and Measurement 306 -- 14.10 Field Testing 309 -- References 323 -- 15 Recommendations 325.
15.1 Introduction 325 -- 15.2 Transition to LTE -- Use Cases 326 -- 15.3 Spectrum Aspects 327 -- 15.4 Effect of the Advanced GSM Features on the Fluent LTE Deployment 343 -- 15.5 Alternative Network Migration Path (Multi-Operator Case) 367 -- 15.6 Hardware Migration Path 376 -- 15.7 Mobile Backhaul -- Towards "All-IP" Transport 381 -- 15.8 LTE Interworking with Legacy Networks for the Optimal Voice and Data Services 384 -- References 405 -- Index 407.
Record Nr. UNISA-996217944903316
Penttinen Jyrki T. J.  
Chichester, West Sussex ; , : , , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
The LTE/SAE deployment handbook / / Jyrki Penttinen
The LTE/SAE deployment handbook / / Jyrki Penttinen
Autore Penttinen Jyrki T. J.
Edizione [1]
Pubbl/distr/stampa Chichester, West Sussex ; , : , , 2012
Descrizione fisica 1 online resource (447 p.)
Disciplina 621.3845/6
Altri autori (Persone) PenttinenJyrki T. J
Soggetto topico Long-Term Evolution (Telecommunications)
System Architecture Evolution (Telecommunications)
ISBN 1-119-96111-4
1-283-40485-0
9786613404855
1-119-95418-5
1-119-95417-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto List of Contributors xv -- Foreword xvii -- Preface xix -- Acknowledgments xxi -- Glossary xxiii -- 1 General 1 -- 1.1 Introduction 1 -- 1.2 The LTE Scene 1 -- 1.3 The Role of LTE in Mobile Communications 2 -- 1.4 LTE/SAE Deployment Process 3 -- 1.5 The Contents of the Book 7 -- References 9 -- 2 Drivers for LTE/SAE 11 -- 2.1 Introduction 11 -- 2.2 Mobile System Generations 11 -- 2.3 Data Service Evolution 14 -- 2.4 Reasons for the Deployment of LTE 19 -- 2.5 Next Steps of LTE/SAE 20 -- 2.6 Summary of the Benefits of LTE 21 -- References 21 -- 3 LTE/SAE Overview 23 -- 3.1 Introduction 23 -- 3.2 LTE/SAE Standards 24 -- 3.3 How to Find Information from Specs? 25 -- 3.4 Evolution Path Towards LTE 27 -- 3.5 Key Parameters of LTE 28 -- 3.6 LTE vs WiMAX 29 -- 3.7 Models for Roaming Architecture 29 -- 3.8 LTE/SAE Services 36 -- 3.9 LTE-Advanced -- Next Generation LTE 40 -- References 42 -- 4 Performance Requirements 45 -- 4.1 Introduction 45 -- 4.2 LTE Key Features 45 -- 4.3 Standards LTE Requirements 49 -- 4.4 Effects of the Requirements on the LTE/SAE Network Deployment 60 -- References 62 -- 5 LTE and SAE Architecture 63 -- 5.1 Introduction 63 -- 5.2 Elements 63 -- 5.3 Interfaces 70 -- 5.4 Protocol Stacks 71 -- 5.5 Layer 2 Structure 75 -- References 77 -- 6 Transport and Core Network 79 -- 6.1 Introduction 79 -- 6.2 Functionality of Transport Elements 79 -- 6.3 Transport Network 83 -- 6.4 Core Network 85 -- 6.5 IP Multimedia Subsystem 86 -- References 93 -- 7 LTE Radio Network 95 -- 7.1 Introduction 95 -- 7.2 LTE Radio Interface 95 -- 7.3 LTE Spectrum 96 -- 7.4 OFDM and OFDMA 96 -- 7.5 SC-FDM and SC-FDMA 107 -- 7.6 Reporting 108 -- 7.7 LTE Radio Resource Management 111 -- 7.8 RRM Principles and Algorithms Common to UL and DL 113 -- 7.9 Uplink RRM 123 -- 7.10 Downlink RRM 128 -- 7.11 Intra-LTE Handover 132 -- References 134 -- 8 Terminals and Applications 137 -- 8.1 Introduction 137 -- 8.2 Effect of Smartphones on LTE 137 -- 8.3 Interworking 139 -- 8.4 LTE Terminal Requirements 143.
8.5 LTE Applications 149 -- References 155 -- 9 Voice Over LTE 157 -- 9.1 Introduction 157 -- 9.2 CS Fallback for Evolved Packet System 158 -- 9.3 SMS Over SGs 159 -- 9.4 Voice and Other CS Services than SMS 164 -- 9.5 Voice and SMS Over IP 169 -- 9.6 Summary 186 -- References 187 -- 10 Functionality of LTE/SAE 189 -- 10.1 Introduction 189 -- 10.2 States 189 -- 10.3 End-to-End Functionality 199 -- 10.4 LTE/SAE Roaming 200 -- 10.5 Charging 216 -- References 219 -- 11 LTE/SAE Security 221 -- 11.1 Introduction 221 -- 11.2 LTE Security Risk Identification 222 -- 11.3 LTE/SAE Service Security -- Case Example 234 -- 11.4 Authentication and Authorization 238 -- 11.5 Customer Data Safety 239 -- 11.6 Lawful Interception 239 -- References 242 -- 12 Planning and Deployment of SAE 243 -- 12.1 Introduction 243 -- 12.2 Network Evolution from 2G/3G PS Core to EPC 243 -- 12.3 Entering Commercial Phase: Support for Multi-Mode LTE/3G/2G Terminals with Pre-Release 8 SGSN 245 -- 12.4 SGSN/MME Evolution 248 -- 12.5 Case Example: Commercial SGSN/MME Offering 249 -- 12.6 Mobile Gateway Evolution 250 -- 12.7 Case Example: Commercial GGSN/S-GW/P-GW Offering 251 -- 12.8 EPC Network Deployment and Topology Considerations 252 -- 12.9 LTE Access Dimensioning 254 -- 13 Radio Network Planning 257 -- 13.1 Introduction 257 -- 13.2 Radio Network Planning Process 257 -- 13.3 Nominal Network Planning 260 -- 13.4 Capacity Planning 263 -- 13.5 Coverage Planning 264 -- 13.6 Self-Optimizing Network 271 -- Reference 272 -- 14 LTE/SAE Measurements 273 -- 14.1 Introduction 273 -- 14.2 General 273 -- 14.3 Principles of Radio Interface Measurements 273 -- 14.4 LTE Field Measurements 282 -- 14.5 Evolution Changes the Rules of Testing 289 -- 14.6 General Test Requirements and Methods for the LTE Air Interface 292 -- 14.7 Test Requirements in SAE 298 -- 14.8 Throughput Testing 300 -- 14.9 Self-Organizing Network Techniques for Test and Measurement 306 -- 14.10 Field Testing 309 -- References 323 -- 15 Recommendations 325.
15.1 Introduction 325 -- 15.2 Transition to LTE -- Use Cases 326 -- 15.3 Spectrum Aspects 327 -- 15.4 Effect of the Advanced GSM Features on the Fluent LTE Deployment 343 -- 15.5 Alternative Network Migration Path (Multi-Operator Case) 367 -- 15.6 Hardware Migration Path 376 -- 15.7 Mobile Backhaul -- Towards "All-IP" Transport 381 -- 15.8 LTE Interworking with Legacy Networks for the Optimal Voice and Data Services 384 -- References 405 -- Index 407.
Record Nr. UNINA-9910809300503321
Penttinen Jyrki T. J.  
Chichester, West Sussex ; , : , , 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless communications security : solutions for the internet of things / / Jyrki T.J. Penttinen, Giesecke & Devrient, USA
Wireless communications security : solutions for the internet of things / / Jyrki T.J. Penttinen, Giesecke & Devrient, USA
Autore Penttinen Jyrki T. J.
Edizione [1st edition]
Pubbl/distr/stampa The Atrium, Southern Gates, Chichester, West Sussex, United Kingdom : , : John Wiley & Sons, Ltd, , 2017
Descrizione fisica 1 online resource (306 pages)
Disciplina 005.8
Soggetto topico Wireless communication systems - Security measures
Internet - Security measures
Computer networks - Security measures
ISBN 1-119-08441-5
1-119-08440-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- About the Author xii -- Preface xiii -- Acknowledgements xv -- Abbreviations xvi -- 1 Introduction 1 -- 1.1 Introduction 1 -- 1.2 Wireless Security 2 -- 1.2.1 Background and Advances 2 -- 1.2.2 Statistics 2 -- 1.2.3 Wireless Threats 4 -- 1.2.4 M2M Environment 9 -- 1.3 Standardization 10 -- 1.3.1 The Open Mobile Alliance (OMA) 10 -- 1.3.2 The International Organization for Standardization (ISO) 12 -- 1.3.3 The International Telecommunications Union (ITU) 14 -- 1.3.4 The European Telecommunications Standards Institute (ETSI) 14 -- 1.3.5 The Institute of Electrical and Electronics Engineers (IEEE) 15 -- 1.3.6 The Internet Engineering Task Force (IETF) 16 -- 1.3.7 The 3rd Generation Partnership Project (3GPP) 16 -- 1.3.8 The 3rd Generation Partnership Project 2 (3GPP2) 25 -- 1.3.9 The GlobalPlatform 25 -- 1.3.10 The SIMalliance 26 -- 1.3.11 The Smartcard Alliance 27 -- 1.3.12 The GSM Association (GSMA) 27 -- 1.3.13 The National Institute of Standards and Technology (NIST) 28 -- 1.3.14 The National Highway Transportation and Safety Administration (NHTSA) 28 -- 1.3.15 Other Standardization and Industry Forums 28 -- 1.3.16 The EMV Company (EMVCo) 29 -- 1.3.17 The Personal Computer/Smartcard (PC/SC) 29 -- 1.3.18 The Health Insurance Portability and Accountability Act (HIPAA) 29 -- 1.3.19 The Common Criteria (CC) 29 -- 1.3.20 The Evaluation Assurance Level (EAL) 30 -- 1.3.21 The Federal Information Processing Standards (FIPS) 31 -- 1.3.22 Biometric Standards 31 -- 1.3.23 Other Related Entities 32 -- 1.4 Wireless Security Principles 32 -- 1.4.1 General 32 -- 1.4.2 Regulation 33 -- 1.4.3 Security Architectures 33 -- 1.4.4 Algorithms and Security Principles 33 -- 1.5 Focus and Contents of the Book 36 -- References 38 -- 2 Security of Wireless Systems 42 -- 2.1 Overview 42 -- 2.1.1 Overall Security Considerations in the Mobile Environment 42 -- 2.1.2 Developing Security Threats 43 -- 2.1.3 RF Interferences and Safety 45 -- 2.2 Effects of Broadband Mobile Data 46 -- 2.2.1 Background 46.
2.2.2 The Role of Networks 47 -- 2.2.3 The Role of Apps 50 -- 2.2.4 UE Application Development 52 -- 2.2.5 Developers 55 -- 2.2.6 The Role of the SIM/UICC 56 -- 2.2.7 Challenges of Legislation 57 -- 2.2.8 Updating Standards 58 -- 2.2.9 3GPP System Evolution 58 -- 2.3 GSM 59 -- 2.3.1 The SIM 60 -- 2.3.2 Authentication and Authorization 62 -- 2.3.3 Encryption of the Radio Interface 63 -- 2.3.4 Encryption of IMSI 65 -- 2.3.5 Other GSM Security Aspects 65 -- 2.4 UMTS/HSPA 66 -- 2.4.1 Principles of 3G Security 66 -- 2.4.2 Key Utilization 68 -- 2.4.3 3G Security Procedures 69 -- 2.5 Long Term Evolution 71 -- 2.5.1 Protection and Security Principles 71 -- 2.5.2 X.509 Certificates and Public Key Infrastructure (PKI) 71 -- 2.5.3 IPsec and Internet Key Exchange (IKE) for LTE Transport Security 72 -- 2.5.4 Traffic Filtering 73 -- 2.5.5 LTE Radio Interface Security 74 -- 2.5.6 Authentication and Authorization 78 -- 2.5.7 LTE/SAE Service Security / Case Examples 79 -- 2.5.8 Multimedia Broadcast and Multicast Service (MBMS) and enhanced MBMS (eMBMS) 83 -- 2.6 Security Aspects of Other Networks 91 -- 2.6.1 CDMA (IS‐95) 91 -- 2.6.2 CDMA2000 93 -- 2.6.3 Broadcast Systems 94 -- 2.6.4 Satellite Systems 94 -- 2.6.5 Terrestrial Trunked Radio (TETRA) 95 -- 2.6.6 Wireless Local Area Network (WLAN) 96 -- 2.7 Interoperability 102 -- 2.7.1 Simultaneous Support for LTE/SAE and 2G/3G 102 -- 2.7.2 VoLTE 105 -- 2.7.3 CS Fallback 105 -- 2.7.4 Inter‐operator Security Aspects 106 -- 2.7.5 Wi‐Fi Networks and Offload 106 -- 2.7.6 Femtocell Architecture 108 -- References 109 -- 3 Internet of Things 112 -- 3.1 Overview 112 -- 3.2 Foundation 113 -- 3.2.1 Definitions 113 -- 3.2.2 Security Considerations of IoT 115 -- 3.2.3 The Role of IoT 115 -- 3.2.4 IoT Environment 117 -- 3.2.5 IoT Market 120 -- 3.2.6 Connectivity 121 -- 3.2.7 Regulation 122 -- 3.2.8 Security Risks 123 -- 3.2.9 Cloud 128 -- 3.2.10 Cellular Connectivity 129 -- 3.2.11 WLAN 133 -- 3.2.12 Low‐Range Systems 133 -- 3.3 Development of IoT 140.
3.3.1 GSMA Connected Living 140 -- 3.3.2 The GlobalPlatform 141 -- 3.3.3 Other Industry Forums 141 -- 3.4 Technical Description of IoT 142 -- 3.4.1 General 142 -- 3.4.2 Secure Communication Channels and Interfaces 143 -- 3.4.3 Provisioning and Key Derivation 144 -- 3.4.4 Use Cases 144 -- References 148 -- 4 Smartcards and Secure Elements 150 -- 4.1 Overview 150 -- 4.2 Role of Smartcards and SEs 151 -- 4.3 Contact Cards 153 -- 4.3.1 ISO/IEC 7816‐1 154 -- 4.3.2 ISO/IEC 7816‐2 155 -- 4.3.3 ISO/IEC 7816‐3 155 -- 4.3.4 ISO/IEC 7816‐4 157 -- 4.3.5 ISO/IEC 7816‐5 157 -- 4.3.6 ISO/IEC 7816‐6 157 -- 4.3.7 ISO/IEC 7816‐7 157 -- 4.3.8 ISO/IEC 7816‐8 157 -- 4.3.9 ISO/IEC 7816‐9 158 -- 4.3.10 ISO/IEC 7816‐10 158 -- 4.3.11 ISO/IEC 7816‐11 158 -- 4.3.12 ISO/IEC 7816‐12 158 -- 4.3.13 ISO/IEC 7816‐13 158 -- 4.3.14 ISO/IEC 7816‐15 158 -- 4.4 The SIM/UICC 159 -- 4.4.1 Terminology 159 -- 4.4.2 Principle 159 -- 4.4.3 Key Standards 160 -- 4.4.4 Form Factors 161 -- 4.5 Contents of the SIM 164 -- 4.5.1 UICC Building Blocks 164 -- 4.5.2 The SIM Application Toolkit (SAT) 167 -- 4.5.3 Contents of the UICC 168 -- 4.6 Embedded SEs 168 -- 4.6.1 Principle 168 -- 4.6.2 M2M Subscription Management 169 -- 4.6.3 Personalization 172 -- 4.6.4 M2M SIM Types 173 -- 4.7 Other Card Types 174 -- 4.7.1 Access Cards 174 -- 4.7.2 External SD Cards 175 -- 4.8 Contactless Cards 175 -- 4.8.1 ISO/IEC Standards 175 -- 4.8.2 NFC 176 -- 4.9 Electromechanical Characteristics of Smartcards 178 -- 4.9.1 HW Blocks 178 -- 4.9.2 Memory 178 -- 4.9.3 Environmental Classes 179 -- 4.10 Smartcard SW 181 -- 4.10.1 File Structure 181 -- 4.10.2 Card Commands 183 -- 4.10.3 Java Card 184 -- 4.11 UICC Communications 184 -- 4.11.1 Card Communications 184 -- 4.11.2 Remote File Management 185 -- References 186 -- 5 Wireless Payment and Access Systems 188 -- 5.1 Overview 188 -- 5.2 Wireless Connectivity as a Base for Payment and Access 188 -- 5.2.1 Barcodes 189 -- 5.2.2 RFID 191 -- 5.2.3 NFC 192 -- 5.2.4 Secure Element 196 -- 5.2.5 Tokenization 198.
5.3 E‐commerce 200 -- 5.3.1 EMV 200 -- 5.3.2 Google Wallet 200 -- 5.3.3 Visa 201 -- 5.3.4 American Express 201 -- 5.3.5 Square 201 -- 5.3.6 Other Bank Initiatives 201 -- 5.3.7 Apple Pay 201 -- 5.3.8 Samsung Pay 202 -- 5.3.9 MCX 202 -- 5.3.10 Comparison of Wallet Solutions 202 -- 5.4 Transport 203 -- 5.4.1 MiFare 204 -- 5.4.2 CiPurse 204 -- 5.4.3 Calypso 204 -- 5.4.4 FeliCa 205 -- 5.5 Other Secure Systems 205 -- 5.5.1 Mobile ID 205 -- 5.5.2 Personal Identity Verification 205 -- 5.5.3 Access Systems 206 -- References 206 -- 6 Wireless Security Platforms and Functionality 208 -- 6.1 Overview 208 -- 6.2 Forming the Base 208 -- 6.2.1 Secure Service Platforms 209 -- 6.2.2 SEs 209 -- 6.3 Remote Subscription Management 210 -- 6.3.1 SIM as a Basis for OTA 210 -- 6.3.2 TSM 212 -- 6.3.3 TEE 213 -- 6.3.4 HCE and the Cloud 216 -- 6.3.5 Comparison 219 -- 6.4 Tokenization 219 -- 6.4.1 PAN Protection 219 -- 6.4.2 HCE and Tokenization 221 -- 6.5 Other Solutions 221 -- 6.5.1 Identity Solutions 221 -- 6.5.2 Multi‐operator Environment 222 -- References 222 -- 7 Mobile Subscription Management 223 -- 7.1 Overview 223 -- 7.2 Subscription Management 223 -- 7.2.1 Development 223 -- 7.2.2 Benefits and Challenges of Subscription Management 225 -- 7.3 OTA Platforms 226 -- 7.3.1 General 226 -- 7.3.2 Provisioning Procedure 227 -- 7.3.3 SMS‐based SIM OTA 227 -- 7.3.4 HTTPS‐based SIM OTA 230 -- 7.3.5 Commercial Examples of SIM OTA Solutions 231 -- 7.4 Evolved Subscription Management 232 -- 7.4.1 GlobalPlatform 233 -- 7.4.2 SIMalliance 233 -- 7.4.3 OMA 233 -- 7.4.4 GSMA 235 -- References 240 -- 8 Security Risks in the Wireless Environment 242 -- 8.1 Overview 242 -- 8.2 Wireless Attack Types 243 -- 8.2.1 Cyber‐attacks 243 -- 8.2.2 Radio Jammers and RF Attacks 244 -- 8.2.3 Attacks against SEs 245 -- 8.2.4 IP Breaches 245 -- 8.2.5 UICC Module 246 -- 8.3 Security Flaws on Mobile Networks 247 -- 8.3.1 Potential Security Weaknesses of GSM 247 -- 8.3.2 Potential Security Weaknesses of 3G 254 -- 8.4 Protection Methods 254.
8.4.1 LTE Security 254 -- 8.4.2 Network Attack Types in LTE/SAE 255 -- 8.4.3 Preparation for the Attacks 256 -- 8.5 Errors in Equipment Manufacturing 259 -- 8.5.1 Equipment Ordering 259 -- 8.5.2 Early Testing 260 -- 8.6 Self‐Organizing Network Techniques for Test and Measurement 264 -- 8.6.1 Principle 264 -- 8.6.2 Self‐configuration 265 -- 8.6.3 Self‐optimizing 266 -- 8.6.4 Self‐healing 266 -- 8.6.5 Technical Issues and Impact on Network Planning 266 -- 8.6.6 Effects on Network Installation, Commissioning and Optimization 267 -- 8.6.7 SON and Security 268 -- References 268 -- 9 Monitoring and Protection Techniques 270 -- 9.1 Overview 270 -- 9.2 Personal Devices 271 -- 9.2.1 Wi‐Fi Connectivity 271 -- 9.2.2 Firewalls 271 -- 9.3 IP Core Protection Techniques 272 -- 9.3.1 General Principles 272 -- 9.3.2 LTE Packet Core Protection 272 -- 9.3.3 Protection against Roaming Threats 275 -- 9.4 HW Fault and Performance Monitoring 276 -- 9.4.1 Network Monitoring 277 -- 9.4.2 Protection against DoS/DDoS 277 -- 9.4.3 Memory Wearing 277 -- 9.5 Security Analysis 278 -- 9.5.1 Post‐processing 278 -- 9.5.2 Real‐time Security Analysis 278 -- 9.6 Virus Protection 279 -- 9.7 Legal Interception 281 -- 9.8 Personal Safety and Privacy 283 -- 9.8.1 CMAS 283 -- 9.8.2 Location Privacy 285 -- 9.8.3 Bio‐effects 286 -- References 287 -- 10 Future of Wireless Solutions and Security 288 -- 10.1 Overview 288 -- 10.2 IoT as a Driving Force 288 -- 10.3 Evolution of 4G 289 -- 10.4 Development of Devices 291 -- 10.4.1 Security Aspects of Smartcards 291 -- 10.4.2 Mobile Device Considerations 291 -- 10.4.3 IoT Device Considerations 292 -- 10.4.4 Sensor Networks and Big Data 293 -- 10.5 5G Mobile Communications 294 -- 10.5.1 Standardization 294 -- 10.5.2 Concept 295 -- 10.5.3 Industry and Investigation Initiatives 297 -- 10.5.4 Role of 5G in IoT 297 -- References 297 -- Index 299.
Record Nr. UNINA-9910135023703321
Penttinen Jyrki T. J.  
The Atrium, Southern Gates, Chichester, West Sussex, United Kingdom : , : John Wiley & Sons, Ltd, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless communications security : solutions for the internet of things / / Jyrki T.J. Penttinen, Giesecke & Devrient, USA
Wireless communications security : solutions for the internet of things / / Jyrki T.J. Penttinen, Giesecke & Devrient, USA
Autore Penttinen Jyrki T. J.
Edizione [1st edition]
Pubbl/distr/stampa The Atrium, Southern Gates, Chichester, West Sussex, United Kingdom : , : John Wiley & Sons, Ltd, , 2017
Descrizione fisica 1 online resource (306 pages)
Disciplina 005.8
Soggetto topico Wireless communication systems - Security measures
Internet - Security measures
Computer networks - Security measures
ISBN 1-119-08441-5
1-119-08440-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- About the Author xii -- Preface xiii -- Acknowledgements xv -- Abbreviations xvi -- 1 Introduction 1 -- 1.1 Introduction 1 -- 1.2 Wireless Security 2 -- 1.2.1 Background and Advances 2 -- 1.2.2 Statistics 2 -- 1.2.3 Wireless Threats 4 -- 1.2.4 M2M Environment 9 -- 1.3 Standardization 10 -- 1.3.1 The Open Mobile Alliance (OMA) 10 -- 1.3.2 The International Organization for Standardization (ISO) 12 -- 1.3.3 The International Telecommunications Union (ITU) 14 -- 1.3.4 The European Telecommunications Standards Institute (ETSI) 14 -- 1.3.5 The Institute of Electrical and Electronics Engineers (IEEE) 15 -- 1.3.6 The Internet Engineering Task Force (IETF) 16 -- 1.3.7 The 3rd Generation Partnership Project (3GPP) 16 -- 1.3.8 The 3rd Generation Partnership Project 2 (3GPP2) 25 -- 1.3.9 The GlobalPlatform 25 -- 1.3.10 The SIMalliance 26 -- 1.3.11 The Smartcard Alliance 27 -- 1.3.12 The GSM Association (GSMA) 27 -- 1.3.13 The National Institute of Standards and Technology (NIST) 28 -- 1.3.14 The National Highway Transportation and Safety Administration (NHTSA) 28 -- 1.3.15 Other Standardization and Industry Forums 28 -- 1.3.16 The EMV Company (EMVCo) 29 -- 1.3.17 The Personal Computer/Smartcard (PC/SC) 29 -- 1.3.18 The Health Insurance Portability and Accountability Act (HIPAA) 29 -- 1.3.19 The Common Criteria (CC) 29 -- 1.3.20 The Evaluation Assurance Level (EAL) 30 -- 1.3.21 The Federal Information Processing Standards (FIPS) 31 -- 1.3.22 Biometric Standards 31 -- 1.3.23 Other Related Entities 32 -- 1.4 Wireless Security Principles 32 -- 1.4.1 General 32 -- 1.4.2 Regulation 33 -- 1.4.3 Security Architectures 33 -- 1.4.4 Algorithms and Security Principles 33 -- 1.5 Focus and Contents of the Book 36 -- References 38 -- 2 Security of Wireless Systems 42 -- 2.1 Overview 42 -- 2.1.1 Overall Security Considerations in the Mobile Environment 42 -- 2.1.2 Developing Security Threats 43 -- 2.1.3 RF Interferences and Safety 45 -- 2.2 Effects of Broadband Mobile Data 46 -- 2.2.1 Background 46.
2.2.2 The Role of Networks 47 -- 2.2.3 The Role of Apps 50 -- 2.2.4 UE Application Development 52 -- 2.2.5 Developers 55 -- 2.2.6 The Role of the SIM/UICC 56 -- 2.2.7 Challenges of Legislation 57 -- 2.2.8 Updating Standards 58 -- 2.2.9 3GPP System Evolution 58 -- 2.3 GSM 59 -- 2.3.1 The SIM 60 -- 2.3.2 Authentication and Authorization 62 -- 2.3.3 Encryption of the Radio Interface 63 -- 2.3.4 Encryption of IMSI 65 -- 2.3.5 Other GSM Security Aspects 65 -- 2.4 UMTS/HSPA 66 -- 2.4.1 Principles of 3G Security 66 -- 2.4.2 Key Utilization 68 -- 2.4.3 3G Security Procedures 69 -- 2.5 Long Term Evolution 71 -- 2.5.1 Protection and Security Principles 71 -- 2.5.2 X.509 Certificates and Public Key Infrastructure (PKI) 71 -- 2.5.3 IPsec and Internet Key Exchange (IKE) for LTE Transport Security 72 -- 2.5.4 Traffic Filtering 73 -- 2.5.5 LTE Radio Interface Security 74 -- 2.5.6 Authentication and Authorization 78 -- 2.5.7 LTE/SAE Service Security / Case Examples 79 -- 2.5.8 Multimedia Broadcast and Multicast Service (MBMS) and enhanced MBMS (eMBMS) 83 -- 2.6 Security Aspects of Other Networks 91 -- 2.6.1 CDMA (IS‐95) 91 -- 2.6.2 CDMA2000 93 -- 2.6.3 Broadcast Systems 94 -- 2.6.4 Satellite Systems 94 -- 2.6.5 Terrestrial Trunked Radio (TETRA) 95 -- 2.6.6 Wireless Local Area Network (WLAN) 96 -- 2.7 Interoperability 102 -- 2.7.1 Simultaneous Support for LTE/SAE and 2G/3G 102 -- 2.7.2 VoLTE 105 -- 2.7.3 CS Fallback 105 -- 2.7.4 Inter‐operator Security Aspects 106 -- 2.7.5 Wi‐Fi Networks and Offload 106 -- 2.7.6 Femtocell Architecture 108 -- References 109 -- 3 Internet of Things 112 -- 3.1 Overview 112 -- 3.2 Foundation 113 -- 3.2.1 Definitions 113 -- 3.2.2 Security Considerations of IoT 115 -- 3.2.3 The Role of IoT 115 -- 3.2.4 IoT Environment 117 -- 3.2.5 IoT Market 120 -- 3.2.6 Connectivity 121 -- 3.2.7 Regulation 122 -- 3.2.8 Security Risks 123 -- 3.2.9 Cloud 128 -- 3.2.10 Cellular Connectivity 129 -- 3.2.11 WLAN 133 -- 3.2.12 Low‐Range Systems 133 -- 3.3 Development of IoT 140.
3.3.1 GSMA Connected Living 140 -- 3.3.2 The GlobalPlatform 141 -- 3.3.3 Other Industry Forums 141 -- 3.4 Technical Description of IoT 142 -- 3.4.1 General 142 -- 3.4.2 Secure Communication Channels and Interfaces 143 -- 3.4.3 Provisioning and Key Derivation 144 -- 3.4.4 Use Cases 144 -- References 148 -- 4 Smartcards and Secure Elements 150 -- 4.1 Overview 150 -- 4.2 Role of Smartcards and SEs 151 -- 4.3 Contact Cards 153 -- 4.3.1 ISO/IEC 7816‐1 154 -- 4.3.2 ISO/IEC 7816‐2 155 -- 4.3.3 ISO/IEC 7816‐3 155 -- 4.3.4 ISO/IEC 7816‐4 157 -- 4.3.5 ISO/IEC 7816‐5 157 -- 4.3.6 ISO/IEC 7816‐6 157 -- 4.3.7 ISO/IEC 7816‐7 157 -- 4.3.8 ISO/IEC 7816‐8 157 -- 4.3.9 ISO/IEC 7816‐9 158 -- 4.3.10 ISO/IEC 7816‐10 158 -- 4.3.11 ISO/IEC 7816‐11 158 -- 4.3.12 ISO/IEC 7816‐12 158 -- 4.3.13 ISO/IEC 7816‐13 158 -- 4.3.14 ISO/IEC 7816‐15 158 -- 4.4 The SIM/UICC 159 -- 4.4.1 Terminology 159 -- 4.4.2 Principle 159 -- 4.4.3 Key Standards 160 -- 4.4.4 Form Factors 161 -- 4.5 Contents of the SIM 164 -- 4.5.1 UICC Building Blocks 164 -- 4.5.2 The SIM Application Toolkit (SAT) 167 -- 4.5.3 Contents of the UICC 168 -- 4.6 Embedded SEs 168 -- 4.6.1 Principle 168 -- 4.6.2 M2M Subscription Management 169 -- 4.6.3 Personalization 172 -- 4.6.4 M2M SIM Types 173 -- 4.7 Other Card Types 174 -- 4.7.1 Access Cards 174 -- 4.7.2 External SD Cards 175 -- 4.8 Contactless Cards 175 -- 4.8.1 ISO/IEC Standards 175 -- 4.8.2 NFC 176 -- 4.9 Electromechanical Characteristics of Smartcards 178 -- 4.9.1 HW Blocks 178 -- 4.9.2 Memory 178 -- 4.9.3 Environmental Classes 179 -- 4.10 Smartcard SW 181 -- 4.10.1 File Structure 181 -- 4.10.2 Card Commands 183 -- 4.10.3 Java Card 184 -- 4.11 UICC Communications 184 -- 4.11.1 Card Communications 184 -- 4.11.2 Remote File Management 185 -- References 186 -- 5 Wireless Payment and Access Systems 188 -- 5.1 Overview 188 -- 5.2 Wireless Connectivity as a Base for Payment and Access 188 -- 5.2.1 Barcodes 189 -- 5.2.2 RFID 191 -- 5.2.3 NFC 192 -- 5.2.4 Secure Element 196 -- 5.2.5 Tokenization 198.
5.3 E‐commerce 200 -- 5.3.1 EMV 200 -- 5.3.2 Google Wallet 200 -- 5.3.3 Visa 201 -- 5.3.4 American Express 201 -- 5.3.5 Square 201 -- 5.3.6 Other Bank Initiatives 201 -- 5.3.7 Apple Pay 201 -- 5.3.8 Samsung Pay 202 -- 5.3.9 MCX 202 -- 5.3.10 Comparison of Wallet Solutions 202 -- 5.4 Transport 203 -- 5.4.1 MiFare 204 -- 5.4.2 CiPurse 204 -- 5.4.3 Calypso 204 -- 5.4.4 FeliCa 205 -- 5.5 Other Secure Systems 205 -- 5.5.1 Mobile ID 205 -- 5.5.2 Personal Identity Verification 205 -- 5.5.3 Access Systems 206 -- References 206 -- 6 Wireless Security Platforms and Functionality 208 -- 6.1 Overview 208 -- 6.2 Forming the Base 208 -- 6.2.1 Secure Service Platforms 209 -- 6.2.2 SEs 209 -- 6.3 Remote Subscription Management 210 -- 6.3.1 SIM as a Basis for OTA 210 -- 6.3.2 TSM 212 -- 6.3.3 TEE 213 -- 6.3.4 HCE and the Cloud 216 -- 6.3.5 Comparison 219 -- 6.4 Tokenization 219 -- 6.4.1 PAN Protection 219 -- 6.4.2 HCE and Tokenization 221 -- 6.5 Other Solutions 221 -- 6.5.1 Identity Solutions 221 -- 6.5.2 Multi‐operator Environment 222 -- References 222 -- 7 Mobile Subscription Management 223 -- 7.1 Overview 223 -- 7.2 Subscription Management 223 -- 7.2.1 Development 223 -- 7.2.2 Benefits and Challenges of Subscription Management 225 -- 7.3 OTA Platforms 226 -- 7.3.1 General 226 -- 7.3.2 Provisioning Procedure 227 -- 7.3.3 SMS‐based SIM OTA 227 -- 7.3.4 HTTPS‐based SIM OTA 230 -- 7.3.5 Commercial Examples of SIM OTA Solutions 231 -- 7.4 Evolved Subscription Management 232 -- 7.4.1 GlobalPlatform 233 -- 7.4.2 SIMalliance 233 -- 7.4.3 OMA 233 -- 7.4.4 GSMA 235 -- References 240 -- 8 Security Risks in the Wireless Environment 242 -- 8.1 Overview 242 -- 8.2 Wireless Attack Types 243 -- 8.2.1 Cyber‐attacks 243 -- 8.2.2 Radio Jammers and RF Attacks 244 -- 8.2.3 Attacks against SEs 245 -- 8.2.4 IP Breaches 245 -- 8.2.5 UICC Module 246 -- 8.3 Security Flaws on Mobile Networks 247 -- 8.3.1 Potential Security Weaknesses of GSM 247 -- 8.3.2 Potential Security Weaknesses of 3G 254 -- 8.4 Protection Methods 254.
8.4.1 LTE Security 254 -- 8.4.2 Network Attack Types in LTE/SAE 255 -- 8.4.3 Preparation for the Attacks 256 -- 8.5 Errors in Equipment Manufacturing 259 -- 8.5.1 Equipment Ordering 259 -- 8.5.2 Early Testing 260 -- 8.6 Self‐Organizing Network Techniques for Test and Measurement 264 -- 8.6.1 Principle 264 -- 8.6.2 Self‐configuration 265 -- 8.6.3 Self‐optimizing 266 -- 8.6.4 Self‐healing 266 -- 8.6.5 Technical Issues and Impact on Network Planning 266 -- 8.6.6 Effects on Network Installation, Commissioning and Optimization 267 -- 8.6.7 SON and Security 268 -- References 268 -- 9 Monitoring and Protection Techniques 270 -- 9.1 Overview 270 -- 9.2 Personal Devices 271 -- 9.2.1 Wi‐Fi Connectivity 271 -- 9.2.2 Firewalls 271 -- 9.3 IP Core Protection Techniques 272 -- 9.3.1 General Principles 272 -- 9.3.2 LTE Packet Core Protection 272 -- 9.3.3 Protection against Roaming Threats 275 -- 9.4 HW Fault and Performance Monitoring 276 -- 9.4.1 Network Monitoring 277 -- 9.4.2 Protection against DoS/DDoS 277 -- 9.4.3 Memory Wearing 277 -- 9.5 Security Analysis 278 -- 9.5.1 Post‐processing 278 -- 9.5.2 Real‐time Security Analysis 278 -- 9.6 Virus Protection 279 -- 9.7 Legal Interception 281 -- 9.8 Personal Safety and Privacy 283 -- 9.8.1 CMAS 283 -- 9.8.2 Location Privacy 285 -- 9.8.3 Bio‐effects 286 -- References 287 -- 10 Future of Wireless Solutions and Security 288 -- 10.1 Overview 288 -- 10.2 IoT as a Driving Force 288 -- 10.3 Evolution of 4G 289 -- 10.4 Development of Devices 291 -- 10.4.1 Security Aspects of Smartcards 291 -- 10.4.2 Mobile Device Considerations 291 -- 10.4.3 IoT Device Considerations 292 -- 10.4.4 Sensor Networks and Big Data 293 -- 10.5 5G Mobile Communications 294 -- 10.5.1 Standardization 294 -- 10.5.2 Concept 295 -- 10.5.3 Industry and Investigation Initiatives 297 -- 10.5.4 Role of 5G in IoT 297 -- References 297 -- Index 299.
Record Nr. UNINA-9910814414803321
Penttinen Jyrki T. J.  
The Atrium, Southern Gates, Chichester, West Sussex, United Kingdom : , : John Wiley & Sons, Ltd, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui