Vai al contenuto principale della pagina
| Autore: |
Prasad Anand R.
|
| Titolo: |
Security in next generation mobile networks : SAE/LTE and WiMAX / / Anand R. Prasad ; Seung-Woo Seo
|
| Pubblicazione: | Aalborg, Denmark : , : River Publishers, , 2011 |
| ©2011 | |
| Descrizione fisica: | 1 online resource (242 p.) |
| Disciplina: | 005.8 |
| Soggetto topico: | Mobile communication systems - Security measures |
| Wireless communication systems - Security measures | |
| Long-Term Evolution (Telecommunications) | |
| Soggetto genere / forma: | Electronic books. |
| Persona (resp. second.): | SŏSŭng-u |
| Note generali: | Description based upon print version of record. |
| Nota di bibliografia: | Includes bibliographical references at the end of each chapters and index. |
| Nota di contenuto: | ""Cover""; ""Contents""; ""Dedication""; ""About the Authors""; ""Preface""; ""1 Introduction""; ""1.1 NGMN""; ""1.1.1 Overview""; ""1.1.2 Security Requirements""; ""1.2 Book Overview""; ""References""; ""2 Security Overview""; ""2.1 Objectives of Information Security""; ""2.1.1 Confidentiality""; ""2.1.2 Integrity""; ""2.1.3 Availability""; ""2.2 Types of Security Attacks""; ""2.2.1 Types of Attacks on Networks""; ""2.2.2 Security on Networks""; ""2.3 Basic Security Functions""; ""2.3.1 Authentication and Authorization""; ""2.3.2 Message Encryption""; ""2.3.3 Digital Signature"" |
| ""2.3.4 Nonrepudiation""""2.3.5 Privacy Guarantee""; ""2.4 Cryptographic Primitives""; ""2.4.1 Symmetric-Key Cryptography Algorithm""; ""2.4.2 Hash Function and MAC""; ""2.4.3 Public-Key Cryptography Algorithm""; ""2.4.4 Random Number Generator""; ""2.4.5 Key Management""; ""2.4.6 Cryptographic Protocol""; ""2.4.7 Comments""; ""2.5 Extensible Authentication Protocol""; ""2.5.1 General EAP Architecture""; ""2.5.2 EAP Authentication Methods""; ""2.6 AAA Protocols""; ""2.6.1 RADIUS""; ""2.6.2 Diameter""; ""2.7 Conclusion""; ""References""; ""3 Standardization""; ""3.1 3GPP"" | |
| ""3.1.1 Organization""""3.1.2 Standardization Process""; ""3.1.3 Evolution: 3GPP Network and Security""; ""3.2 IEEE 802.16 and WiMAX""; ""3.2.1 IEEE 802.16 Standards""; ""3.2.2 WiMAX Forum®""; ""3.2.3 WiMAX Technology Evolution""; ""3.2.4 Security Overview in WiMAX""; ""References""; ""4 System Architecture and Long-Term Evolution Security""; ""4.1 Chapter Overview""; ""4.2 EPS System Overview""; ""4.2.1 Network Elements and Security Functions""; ""4.2.2 Protocol Layers and Security Functions""; ""4.3 Network Attachment""; ""4.4 Tracking Area""; ""4.5 Mobility"" | |
| ""4.6 Idle State Signaling Reduction""""4.7 EPS Identities""; ""4.8 Security Requirements""; ""4.9 Basic Points""; ""4.9.1 Key Hierarchy and Key Lifetime""; ""4.9.2 Security Contexts""; ""4.9.3 NAS Counts and Handling""; ""4.9.4 Cryptographic Algorithms and Usage Overview""; ""4.10 Authentication and Key Agreement (AKA)""; ""4.10.1 Basic Requirements""; ""4.10.2 Authentication Decision and Context Retrieval""; ""4.10.3 Authentication Procedure""; ""4.11 Algorithm Negotiation and Security Activation""; ""4.11.1 Algorithm Negotiation Requirements""; ""4.11.2 Non-access Stratum"" | |
| ""4.11.3 Access Stratum""""4.12 Key Handling at State Change""; ""4.13 Handover Key Handling""; ""4.14 Key Change On-The-Fly""; ""4.15 Connection Reestablishment: Token""; ""4.16 Local Authentication""; ""4.17 Inter-System Mobility""; ""4.17.1 Idle-Mode Mobility""; ""4.17.2 Handover""; ""4.18 Voice Call Continuity""; ""4.19 Emergency Call Security""; ""Bibliography""; ""5 Security in IEEE 802.16e/WiMAX""; ""5.1 Overview""; ""5.1.1 WiMAX Protocol Stack""; ""5.1.2 Architecture of WiMAX Security Sublayer""; ""5.2 Privacy Key Management""; ""5.2.1 Security Associations""; ""5.2.2 PKMv1"" | |
| ""5.2.3 PKMv2"" | |
| Titolo autorizzato: | Security in next generation mobile networks ![]() |
| ISBN: | 87-92982-86-7 |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 9910464381203321 |
| Lo trovi qui: | Univ. Federico II |
| Opac: | Controlla la disponibilità qui |