Security in next generation mobile networks : SAE/LTE and WiMAX / / Anand R. Prasad ; Seung-Woo Seo
| Security in next generation mobile networks : SAE/LTE and WiMAX / / Anand R. Prasad ; Seung-Woo Seo |
| Autore | Prasad Anand R. |
| Pubbl/distr/stampa | Aalborg, Denmark : , : River Publishers, , 2011 |
| Descrizione fisica | 1 online resource (242 p.) |
| Disciplina | 005.8 |
| Collana | River Publishers Series in Standardisation |
| Soggetto topico |
Mobile communication systems - Security measures
Wireless communication systems - Security measures Long-Term Evolution (Telecommunications) |
| Soggetto genere / forma | Electronic books. |
| ISBN | 87-92982-86-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
""Cover""; ""Contents""; ""Dedication""; ""About the Authors""; ""Preface""; ""1 Introduction""; ""1.1 NGMN""; ""1.1.1 Overview""; ""1.1.2 Security Requirements""; ""1.2 Book Overview""; ""References""; ""2 Security Overview""; ""2.1 Objectives of Information Security""; ""2.1.1 Confidentiality""; ""2.1.2 Integrity""; ""2.1.3 Availability""; ""2.2 Types of Security Attacks""; ""2.2.1 Types of Attacks on Networks""; ""2.2.2 Security on Networks""; ""2.3 Basic Security Functions""; ""2.3.1 Authentication and Authorization""; ""2.3.2 Message Encryption""; ""2.3.3 Digital Signature""
""2.3.4 Nonrepudiation""""2.3.5 Privacy Guarantee""; ""2.4 Cryptographic Primitives""; ""2.4.1 Symmetric-Key Cryptography Algorithm""; ""2.4.2 Hash Function and MAC""; ""2.4.3 Public-Key Cryptography Algorithm""; ""2.4.4 Random Number Generator""; ""2.4.5 Key Management""; ""2.4.6 Cryptographic Protocol""; ""2.4.7 Comments""; ""2.5 Extensible Authentication Protocol""; ""2.5.1 General EAP Architecture""; ""2.5.2 EAP Authentication Methods""; ""2.6 AAA Protocols""; ""2.6.1 RADIUS""; ""2.6.2 Diameter""; ""2.7 Conclusion""; ""References""; ""3 Standardization""; ""3.1 3GPP"" ""3.1.1 Organization""""3.1.2 Standardization Process""; ""3.1.3 Evolution: 3GPP Network and Security""; ""3.2 IEEE 802.16 and WiMAX""; ""3.2.1 IEEE 802.16 Standards""; ""3.2.2 WiMAX Forum®""; ""3.2.3 WiMAX Technology Evolution""; ""3.2.4 Security Overview in WiMAX""; ""References""; ""4 System Architecture and Long-Term Evolution Security""; ""4.1 Chapter Overview""; ""4.2 EPS System Overview""; ""4.2.1 Network Elements and Security Functions""; ""4.2.2 Protocol Layers and Security Functions""; ""4.3 Network Attachment""; ""4.4 Tracking Area""; ""4.5 Mobility"" ""4.6 Idle State Signaling Reduction""""4.7 EPS Identities""; ""4.8 Security Requirements""; ""4.9 Basic Points""; ""4.9.1 Key Hierarchy and Key Lifetime""; ""4.9.2 Security Contexts""; ""4.9.3 NAS Counts and Handling""; ""4.9.4 Cryptographic Algorithms and Usage Overview""; ""4.10 Authentication and Key Agreement (AKA)""; ""4.10.1 Basic Requirements""; ""4.10.2 Authentication Decision and Context Retrieval""; ""4.10.3 Authentication Procedure""; ""4.11 Algorithm Negotiation and Security Activation""; ""4.11.1 Algorithm Negotiation Requirements""; ""4.11.2 Non-access Stratum"" ""4.11.3 Access Stratum""""4.12 Key Handling at State Change""; ""4.13 Handover Key Handling""; ""4.14 Key Change On-The-Fly""; ""4.15 Connection Reestablishment: Token""; ""4.16 Local Authentication""; ""4.17 Inter-System Mobility""; ""4.17.1 Idle-Mode Mobility""; ""4.17.2 Handover""; ""4.18 Voice Call Continuity""; ""4.19 Emergency Call Security""; ""Bibliography""; ""5 Security in IEEE 802.16e/WiMAX""; ""5.1 Overview""; ""5.1.1 WiMAX Protocol Stack""; ""5.1.2 Architecture of WiMAX Security Sublayer""; ""5.2 Privacy Key Management""; ""5.2.1 Security Associations""; ""5.2.2 PKMv1"" ""5.2.3 PKMv2"" |
| Record Nr. | UNINA-9910464381203321 |
Prasad Anand R.
|
||
| Aalborg, Denmark : , : River Publishers, , 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security in next generation mobile networks : SAE/LTE and WiMAX / / Anand R. Prasad and Seung-Woo Seo
| Security in next generation mobile networks : SAE/LTE and WiMAX / / Anand R. Prasad and Seung-Woo Seo |
| Autore | Prasad Anand |
| Pubbl/distr/stampa | Gistrup, Denmark : , : River Publishers, , [2011] |
| Descrizione fisica | 1 online resource (242 p.) |
| Disciplina | 005.8 |
| Collana | River Publishers Series in Standardisation |
| Soggetto topico |
IEEE 802.16 (Standard)
Long-Term Evolution (Telecommunications) |
| ISBN |
1-00-333939-5
1-000-79538-1 1-003-33939-5 1-000-79269-2 87-92982-86-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
""Cover""; ""Contents""; ""Dedication""; ""About the Authors""; ""Preface""; ""1 Introduction""; ""1.1 NGMN""; ""1.1.1 Overview""; ""1.1.2 Security Requirements""; ""1.2 Book Overview""; ""References""; ""2 Security Overview""; ""2.1 Objectives of Information Security""; ""2.1.1 Confidentiality""; ""2.1.2 Integrity""; ""2.1.3 Availability""; ""2.2 Types of Security Attacks""; ""2.2.1 Types of Attacks on Networks""; ""2.2.2 Security on Networks""; ""2.3 Basic Security Functions""; ""2.3.1 Authentication and Authorization""; ""2.3.2 Message Encryption""; ""2.3.3 Digital Signature""
""2.3.4 Nonrepudiation""""2.3.5 Privacy Guarantee""; ""2.4 Cryptographic Primitives""; ""2.4.1 Symmetric-Key Cryptography Algorithm""; ""2.4.2 Hash Function and MAC""; ""2.4.3 Public-Key Cryptography Algorithm""; ""2.4.4 Random Number Generator""; ""2.4.5 Key Management""; ""2.4.6 Cryptographic Protocol""; ""2.4.7 Comments""; ""2.5 Extensible Authentication Protocol""; ""2.5.1 General EAP Architecture""; ""2.5.2 EAP Authentication Methods""; ""2.6 AAA Protocols""; ""2.6.1 RADIUS""; ""2.6.2 Diameter""; ""2.7 Conclusion""; ""References""; ""3 Standardization""; ""3.1 3GPP"" ""3.1.1 Organization""""3.1.2 Standardization Process""; ""3.1.3 Evolution: 3GPP Network and Security""; ""3.2 IEEE 802.16 and WiMAX""; ""3.2.1 IEEE 802.16 Standards""; ""3.2.2 WiMAX Forum®""; ""3.2.3 WiMAX Technology Evolution""; ""3.2.4 Security Overview in WiMAX""; ""References""; ""4 System Architecture and Long-Term Evolution Security""; ""4.1 Chapter Overview""; ""4.2 EPS System Overview""; ""4.2.1 Network Elements and Security Functions""; ""4.2.2 Protocol Layers and Security Functions""; ""4.3 Network Attachment""; ""4.4 Tracking Area""; ""4.5 Mobility"" ""4.6 Idle State Signaling Reduction""""4.7 EPS Identities""; ""4.8 Security Requirements""; ""4.9 Basic Points""; ""4.9.1 Key Hierarchy and Key Lifetime""; ""4.9.2 Security Contexts""; ""4.9.3 NAS Counts and Handling""; ""4.9.4 Cryptographic Algorithms and Usage Overview""; ""4.10 Authentication and Key Agreement (AKA)""; ""4.10.1 Basic Requirements""; ""4.10.2 Authentication Decision and Context Retrieval""; ""4.10.3 Authentication Procedure""; ""4.11 Algorithm Negotiation and Security Activation""; ""4.11.1 Algorithm Negotiation Requirements""; ""4.11.2 Non-access Stratum"" ""4.11.3 Access Stratum""""4.12 Key Handling at State Change""; ""4.13 Handover Key Handling""; ""4.14 Key Change On-The-Fly""; ""4.15 Connection Reestablishment: Token""; ""4.16 Local Authentication""; ""4.17 Inter-System Mobility""; ""4.17.1 Idle-Mode Mobility""; ""4.17.2 Handover""; ""4.18 Voice Call Continuity""; ""4.19 Emergency Call Security""; ""Bibliography""; ""5 Security in IEEE 802.16e/WiMAX""; ""5.1 Overview""; ""5.1.1 WiMAX Protocol Stack""; ""5.1.2 Architecture of WiMAX Security Sublayer""; ""5.2 Privacy Key Management""; ""5.2.1 Security Associations""; ""5.2.2 PKMv1"" ""5.2.3 PKMv2"" |
| Record Nr. | UNINA-9910789376003321 |
Prasad Anand
|
||
| Gistrup, Denmark : , : River Publishers, , [2011] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security in next generation mobile networks : SAE/LTE and WiMAX / / Anand R. Prasad and Seung-Woo Seo
| Security in next generation mobile networks : SAE/LTE and WiMAX / / Anand R. Prasad and Seung-Woo Seo |
| Autore | Prasad Anand |
| Pubbl/distr/stampa | Gistrup, Denmark : , : River Publishers, , [2011] |
| Descrizione fisica | 1 online resource (242 p.) |
| Disciplina | 005.8 |
| Collana | River Publishers Series in Standardisation |
| Soggetto topico |
IEEE 802.16 (Standard)
Long-Term Evolution (Telecommunications) |
| ISBN |
1-00-333939-5
1-000-79538-1 1-003-33939-5 1-000-79269-2 87-92982-86-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
""Cover""; ""Contents""; ""Dedication""; ""About the Authors""; ""Preface""; ""1 Introduction""; ""1.1 NGMN""; ""1.1.1 Overview""; ""1.1.2 Security Requirements""; ""1.2 Book Overview""; ""References""; ""2 Security Overview""; ""2.1 Objectives of Information Security""; ""2.1.1 Confidentiality""; ""2.1.2 Integrity""; ""2.1.3 Availability""; ""2.2 Types of Security Attacks""; ""2.2.1 Types of Attacks on Networks""; ""2.2.2 Security on Networks""; ""2.3 Basic Security Functions""; ""2.3.1 Authentication and Authorization""; ""2.3.2 Message Encryption""; ""2.3.3 Digital Signature""
""2.3.4 Nonrepudiation""""2.3.5 Privacy Guarantee""; ""2.4 Cryptographic Primitives""; ""2.4.1 Symmetric-Key Cryptography Algorithm""; ""2.4.2 Hash Function and MAC""; ""2.4.3 Public-Key Cryptography Algorithm""; ""2.4.4 Random Number Generator""; ""2.4.5 Key Management""; ""2.4.6 Cryptographic Protocol""; ""2.4.7 Comments""; ""2.5 Extensible Authentication Protocol""; ""2.5.1 General EAP Architecture""; ""2.5.2 EAP Authentication Methods""; ""2.6 AAA Protocols""; ""2.6.1 RADIUS""; ""2.6.2 Diameter""; ""2.7 Conclusion""; ""References""; ""3 Standardization""; ""3.1 3GPP"" ""3.1.1 Organization""""3.1.2 Standardization Process""; ""3.1.3 Evolution: 3GPP Network and Security""; ""3.2 IEEE 802.16 and WiMAX""; ""3.2.1 IEEE 802.16 Standards""; ""3.2.2 WiMAX Forum®""; ""3.2.3 WiMAX Technology Evolution""; ""3.2.4 Security Overview in WiMAX""; ""References""; ""4 System Architecture and Long-Term Evolution Security""; ""4.1 Chapter Overview""; ""4.2 EPS System Overview""; ""4.2.1 Network Elements and Security Functions""; ""4.2.2 Protocol Layers and Security Functions""; ""4.3 Network Attachment""; ""4.4 Tracking Area""; ""4.5 Mobility"" ""4.6 Idle State Signaling Reduction""""4.7 EPS Identities""; ""4.8 Security Requirements""; ""4.9 Basic Points""; ""4.9.1 Key Hierarchy and Key Lifetime""; ""4.9.2 Security Contexts""; ""4.9.3 NAS Counts and Handling""; ""4.9.4 Cryptographic Algorithms and Usage Overview""; ""4.10 Authentication and Key Agreement (AKA)""; ""4.10.1 Basic Requirements""; ""4.10.2 Authentication Decision and Context Retrieval""; ""4.10.3 Authentication Procedure""; ""4.11 Algorithm Negotiation and Security Activation""; ""4.11.1 Algorithm Negotiation Requirements""; ""4.11.2 Non-access Stratum"" ""4.11.3 Access Stratum""""4.12 Key Handling at State Change""; ""4.13 Handover Key Handling""; ""4.14 Key Change On-The-Fly""; ""4.15 Connection Reestablishment: Token""; ""4.16 Local Authentication""; ""4.17 Inter-System Mobility""; ""4.17.1 Idle-Mode Mobility""; ""4.17.2 Handover""; ""4.18 Voice Call Continuity""; ""4.19 Emergency Call Security""; ""Bibliography""; ""5 Security in IEEE 802.16e/WiMAX""; ""5.1 Overview""; ""5.1.1 WiMAX Protocol Stack""; ""5.1.2 Architecture of WiMAX Security Sublayer""; ""5.2 Privacy Key Management""; ""5.2.1 Security Associations""; ""5.2.2 PKMv1"" ""5.2.3 PKMv2"" |
| Record Nr. | UNINA-9910816563003321 |
Prasad Anand
|
||
| Gistrup, Denmark : , : River Publishers, , [2011] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||