top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
5G explained : security and deployment of advanced mobile communications / / Jyrki T.J. Penttinen
5G explained : security and deployment of advanced mobile communications / / Jyrki T.J. Penttinen
Autore Penttinen Jyrki T. J.
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey, USA : , : John Wiley & Sons, Inc., , 2019
Descrizione fisica 1 online resource (418 pages)
Disciplina 621.3845/6
Soggetto topico Global system for mobile communications - Security measures
Global system for mobile communications - Technological innovation
Soggetto genere / forma Electronic books.
ISBN 1-119-27570-9
1-119-27573-3
1-119-27569-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Table of Contents; Author Biography; Preface; Acknowledgments; Abbreviation List; 1 Introduction; 1.1 Overview; 1.2 What Is 5G?; 1.3 Background; 1.4 Research; 1.5 Challenges for Electronics; 1.6 Expected 5G in Practice; 1.7 5G and Security; 1.8 Motivations; 1.9 5G Standardization and Regulation; 1.10 Global Standardization in 5G Era; 1.11 Introduction to the Book; References; 2 Requirements; 2.1 Overview; 2.2 Background; 2.3 5G Requirements Based on ITU; 2.4 The Technical Specifications of 3GPP; 2.5 NGMN; 2.6 Mobile Network Operators; 2.7 Mobile Device Manufacturers; References
3 Positioning of 5G3.1 Overview; 3.2 Mobile Generations; 3.3 The Role of 3GPP in LPWA and IoT; 3.4 The Role of 5G in Automotive (V2X); 3.5 The Role of 5G in the Cyber-World; References; 4 Architecture; 4.1 Overview; 4.2 Architecture; 4.3 Renewed Functionality of the 5G System; 4.4 Supporting Solutions for 5G; 4.5 Control and User Plane Separation of EPC Nodes (CUPS); References; 5 Radio Network; 5.1 Overview; 5.2 5G Performance; 5.3 5G Spectrum; 5.4 5G Radio Access Technologies; 5.5 Uplink OFDM of 5G: CP-OFDM and DFT-s-OFDM; 5.6 Downlink; 5.7 New Radio (NR) Interface of 3GPP; 5.8 User Devices
5.9 Other Aspects5.10 CBRS; References; 6 Core Network; 6.1 Overview; 6.2 Preparing the Core for 5G; 6.3 5G Core Network Elements; 6.4 5G Functionalities Implemented in 5G Core; 6.5 Transport Network; 6.6 Protocols and Interfaces; 6.7 5G Core Network Services; References; 7 Services and Applications; 7.1 Overview; 7.2 5G Services; 7.3 Network Function-Related Cases; 7.4 Vehicle Communications; 7.5 Machine Learning and Artificial Intelligence; References; 8 Security; 8.1 Overview; 8.2 5G Security Threats and Challenges; 8.3 Development
8.4 Security Implications in 5G Environments and Use Cases8.5 5G Security Layers; 8.6 Device Security; 8.7 Security Between Network Entities; 8.8 Security Opportunities for Stakeholders; 8.9 5G Security Architecture for 3GPP Networks; 8.10 UICC Evolution; 8.11 5G Security Development; 8.12 UICC Variants; References; 9 5G Network Planning and Optimization; 9.1 Overview; 9.2 5G Core and Transmission Network Dimensioning; 9.3 5G Radio Network Planning; References; 10 Deployment; 10.1 Overview; 10.2 Trials and Early Adopters Prior to 2020; 10.3 5G Frequency Bands
10.4 Core and Radio Network Deployment Scenarios10.5 Standalone and Non-Standalone Deployment Scenarios; 10.6 5G Network Interfaces and Elements; 10.7 Core Deployment; 10.8 CoMP; 10.9 Measurements; References; Index; End User License Agreement
Altri titoli varianti Five G explained
Record Nr. UNINA-9910467355903321
Penttinen Jyrki T. J.  
Hoboken, New Jersey, USA : , : John Wiley & Sons, Inc., , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
5G explained : security and deployment of advanced mobile communications / / Jyrki T.J. Penttinen
5G explained : security and deployment of advanced mobile communications / / Jyrki T.J. Penttinen
Autore Penttinen Jyrki T. J.
Edizione [First edition]
Pubbl/distr/stampa Hoboken, New Jersey, USA : , : John Wiley & Sons, Inc., , 2019
Descrizione fisica 1 online resource (418 pages)
Disciplina 621.3845/6
Collana THEi Wiley ebooks.
Soggetto topico Global system for mobile communications - Security measures
Global system for mobile communications - Technological innovation
ISBN 1-119-27570-9
1-119-27573-3
1-119-27569-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Table of Contents; Author Biography; Preface; Acknowledgments; Abbreviation List; 1 Introduction; 1.1 Overview; 1.2 What Is 5G?; 1.3 Background; 1.4 Research; 1.5 Challenges for Electronics; 1.6 Expected 5G in Practice; 1.7 5G and Security; 1.8 Motivations; 1.9 5G Standardization and Regulation; 1.10 Global Standardization in 5G Era; 1.11 Introduction to the Book; References; 2 Requirements; 2.1 Overview; 2.2 Background; 2.3 5G Requirements Based on ITU; 2.4 The Technical Specifications of 3GPP; 2.5 NGMN; 2.6 Mobile Network Operators; 2.7 Mobile Device Manufacturers; References
3 Positioning of 5G3.1 Overview; 3.2 Mobile Generations; 3.3 The Role of 3GPP in LPWA and IoT; 3.4 The Role of 5G in Automotive (V2X); 3.5 The Role of 5G in the Cyber-World; References; 4 Architecture; 4.1 Overview; 4.2 Architecture; 4.3 Renewed Functionality of the 5G System; 4.4 Supporting Solutions for 5G; 4.5 Control and User Plane Separation of EPC Nodes (CUPS); References; 5 Radio Network; 5.1 Overview; 5.2 5G Performance; 5.3 5G Spectrum; 5.4 5G Radio Access Technologies; 5.5 Uplink OFDM of 5G: CP-OFDM and DFT-s-OFDM; 5.6 Downlink; 5.7 New Radio (NR) Interface of 3GPP; 5.8 User Devices
5.9 Other Aspects5.10 CBRS; References; 6 Core Network; 6.1 Overview; 6.2 Preparing the Core for 5G; 6.3 5G Core Network Elements; 6.4 5G Functionalities Implemented in 5G Core; 6.5 Transport Network; 6.6 Protocols and Interfaces; 6.7 5G Core Network Services; References; 7 Services and Applications; 7.1 Overview; 7.2 5G Services; 7.3 Network Function-Related Cases; 7.4 Vehicle Communications; 7.5 Machine Learning and Artificial Intelligence; References; 8 Security; 8.1 Overview; 8.2 5G Security Threats and Challenges; 8.3 Development
8.4 Security Implications in 5G Environments and Use Cases8.5 5G Security Layers; 8.6 Device Security; 8.7 Security Between Network Entities; 8.8 Security Opportunities for Stakeholders; 8.9 5G Security Architecture for 3GPP Networks; 8.10 UICC Evolution; 8.11 5G Security Development; 8.12 UICC Variants; References; 9 5G Network Planning and Optimization; 9.1 Overview; 9.2 5G Core and Transmission Network Dimensioning; 9.3 5G Radio Network Planning; References; 10 Deployment; 10.1 Overview; 10.2 Trials and Early Adopters Prior to 2020; 10.3 5G Frequency Bands
10.4 Core and Radio Network Deployment Scenarios10.5 Standalone and Non-Standalone Deployment Scenarios; 10.6 5G Network Interfaces and Elements; 10.7 Core Deployment; 10.8 CoMP; 10.9 Measurements; References; Index; End User License Agreement
Altri titoli varianti Five G explained
Record Nr. UNINA-9910542291703321
Penttinen Jyrki T. J.  
Hoboken, New Jersey, USA : , : John Wiley & Sons, Inc., , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
5G explained : security and deployment of advanced mobile communications / / Jyrki T.J. Penttinen
5G explained : security and deployment of advanced mobile communications / / Jyrki T.J. Penttinen
Autore Penttinen Jyrki T. J.
Edizione [First edition]
Pubbl/distr/stampa Hoboken, New Jersey, USA : , : John Wiley & Sons, Inc., , 2019
Descrizione fisica 1 online resource (418 pages)
Disciplina 621.3845/6
Collana THEi Wiley ebooks.
Soggetto topico Global system for mobile communications - Security measures
Global system for mobile communications - Technological innovation
ISBN 1-119-27570-9
1-119-27573-3
1-119-27569-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Table of Contents; Author Biography; Preface; Acknowledgments; Abbreviation List; 1 Introduction; 1.1 Overview; 1.2 What Is 5G?; 1.3 Background; 1.4 Research; 1.5 Challenges for Electronics; 1.6 Expected 5G in Practice; 1.7 5G and Security; 1.8 Motivations; 1.9 5G Standardization and Regulation; 1.10 Global Standardization in 5G Era; 1.11 Introduction to the Book; References; 2 Requirements; 2.1 Overview; 2.2 Background; 2.3 5G Requirements Based on ITU; 2.4 The Technical Specifications of 3GPP; 2.5 NGMN; 2.6 Mobile Network Operators; 2.7 Mobile Device Manufacturers; References
3 Positioning of 5G3.1 Overview; 3.2 Mobile Generations; 3.3 The Role of 3GPP in LPWA and IoT; 3.4 The Role of 5G in Automotive (V2X); 3.5 The Role of 5G in the Cyber-World; References; 4 Architecture; 4.1 Overview; 4.2 Architecture; 4.3 Renewed Functionality of the 5G System; 4.4 Supporting Solutions for 5G; 4.5 Control and User Plane Separation of EPC Nodes (CUPS); References; 5 Radio Network; 5.1 Overview; 5.2 5G Performance; 5.3 5G Spectrum; 5.4 5G Radio Access Technologies; 5.5 Uplink OFDM of 5G: CP-OFDM and DFT-s-OFDM; 5.6 Downlink; 5.7 New Radio (NR) Interface of 3GPP; 5.8 User Devices
5.9 Other Aspects5.10 CBRS; References; 6 Core Network; 6.1 Overview; 6.2 Preparing the Core for 5G; 6.3 5G Core Network Elements; 6.4 5G Functionalities Implemented in 5G Core; 6.5 Transport Network; 6.6 Protocols and Interfaces; 6.7 5G Core Network Services; References; 7 Services and Applications; 7.1 Overview; 7.2 5G Services; 7.3 Network Function-Related Cases; 7.4 Vehicle Communications; 7.5 Machine Learning and Artificial Intelligence; References; 8 Security; 8.1 Overview; 8.2 5G Security Threats and Challenges; 8.3 Development
8.4 Security Implications in 5G Environments and Use Cases8.5 5G Security Layers; 8.6 Device Security; 8.7 Security Between Network Entities; 8.8 Security Opportunities for Stakeholders; 8.9 5G Security Architecture for 3GPP Networks; 8.10 UICC Evolution; 8.11 5G Security Development; 8.12 UICC Variants; References; 9 5G Network Planning and Optimization; 9.1 Overview; 9.2 5G Core and Transmission Network Dimensioning; 9.3 5G Radio Network Planning; References; 10 Deployment; 10.1 Overview; 10.2 Trials and Early Adopters Prior to 2020; 10.3 5G Frequency Bands
10.4 Core and Radio Network Deployment Scenarios10.5 Standalone and Non-Standalone Deployment Scenarios; 10.6 5G Network Interfaces and Elements; 10.7 Core Deployment; 10.8 CoMP; 10.9 Measurements; References; Index; End User License Agreement
Altri titoli varianti Five G explained
Record Nr. UNINA-9910828550103321
Penttinen Jyrki T. J.  
Hoboken, New Jersey, USA : , : John Wiley & Sons, Inc., , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bulletproof wireless security [[electronic resource] ] : GSM, UMTS, 802.11 and ad hoc security / / by Praphul Chandra
Bulletproof wireless security [[electronic resource] ] : GSM, UMTS, 802.11 and ad hoc security / / by Praphul Chandra
Autore Chandra Praphul
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Oxford, : Newnes, 2005
Descrizione fisica 1 online resource (272 p.)
Disciplina 005.8
Collana Communications engineering series
Soggetto topico Wireless communication systems - Security measures
Wireless LANs - Security measures
Global system for mobile communications - Security measures
Universal Mobile Telecommunications System - Security measures
IEEE 802.11 (Standard)
Soggetto genere / forma Electronic books.
ISBN 1-281-00975-X
9786611009755
0-08-047631-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1.7 Beyond Cryptography1.7.1 Firewalls; 1.7.2 Denial of Service Attacks; 1.7.3 Code Security; 1.7.4 Steganography; 1.8 Conclusion; Chapter 2: Network Security Protocols; 2.1 Introduction; 2.2 Key Establishment Protocols; 2.2.1 Key Generation in SKC; 2.2.2 Key Distribution in SKC; 2.2.3 Key Establishment in PKC; 2.2.4 Diffie-Hellman Key Exchange; 2.2.5 Enhanced Diffie-Hellman Key Exchange; 2.2.6 RSA; 2.3 Authentication Protocols; 2.3.1 Address-Based Authentication; 2.3.2 Passwords for Local Authentication (Login); 2.3.3 Passwords for Network Authentication; 2.3.4 Authentication Using SKC
2.3.5 Authentication Using PKC2.3.6 What to Use for Authentication: SKC or PKC?; 2.3.7 Session Hijacking; 2.3.8 Needham Schroeder; 2.3.9 Kerberos; 2.4 Encryption Protocols; 2.4.1 DES; 2.4.2 TripleDES or 3DES; 2.4.3 AES; 2.4.4 RC4; 2.5 Integrity Protocols; 2.5.1 CBC Residue; 2.5.2 CRC32; 2.5.3 MD5; Chapter 3: Security and the Layered Architecture; 3.1 Introduction; 3.2 Security at Layer 1; 3.3 Security at Layer 2; 3.3.1 Extensible Authentication Protocol (EAP); 3.3.2 EAPoL: EAP Over LAN; 3.3.3 EAP-TLS: TLS Handshake Over EAP; 3.4 Security at Layer 3; 3.5 Security at Layer 4: SSL/TLS
3.6 Security at Layer 5+Chapter 4: Voice-Oriented Wireless Networks; 4.1 The Wireless Medium; 4.1.1 Radio Propagation Effects; 4.1.2 Hidden Terminal Problem; 4.1.3 Exposed Terminal Problem; 4.1.4 Bandwidth; 4.1.5 Other Constraints; 4.2 The Cellular Architecture; 4.3 TWNs: First Generation; 4.3.1 Addresses in AMPS; 4.3.2 Call Setup in AMPS; 4.4 TWNs: Second Generation; 4.4.1 Addresses in GSM; 4.4.2 Call Setup in GSM; 4.5 TWNs: Third Generation; 4.5.1 Connection Setup in UMTS; 4.6 The Overall Picture; Chapter 5: Data-Oriented Wireless Networks; 5.1 WLANs; 5.1.1: Addresses in 802.11
5.1.2 Connection Setup in 802.115.1.3 Media Access; 5.1.4 Spectrum Efficiency in 802.11; 5.2 MANETs; 5.2.1 MAC for MANETs; 5.2.2 Routing in MANETs.; 5.2.3 Address Allocation in MANETs; 5.2.4 Security in MANETs; 5.3 Wireless Networks in the Near Future; Chapter 6: Security in Traditional Wireless Networks; 6.1 Security in First Generation TWNs; 6.2 Security in Second Generation TWNs; 6.2.1 Anonymity in GSM; 6.2.2 Key Establishment in GSM; 6.2.3 Authentication in GSM; 6.2.4 Confidentiality in GSM; 6.2.5 What's Wrong with GSM Security?; 6.3 Security in 2.5 Generation TWNs; 6.3.1 WAP
6.3.2 Code Security
Record Nr. UNINA-9910457082903321
Chandra Praphul  
Amsterdam ; ; Oxford, : Newnes, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bulletproof wireless security [[electronic resource] ] : GSM, UMTS, 802.11 and ad hoc security / / by Praphul Chandra
Bulletproof wireless security [[electronic resource] ] : GSM, UMTS, 802.11 and ad hoc security / / by Praphul Chandra
Autore Chandra Praphul
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Oxford, : Newnes, 2005
Descrizione fisica 1 online resource (272 p.)
Disciplina 005.8
Collana Communications engineering series
Soggetto topico Wireless communication systems - Security measures
Wireless LANs - Security measures
Global system for mobile communications - Security measures
Universal Mobile Telecommunications System - Security measures
IEEE 802.11 (Standard)
ISBN 1-281-00975-X
9786611009755
0-08-047631-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1.7 Beyond Cryptography1.7.1 Firewalls; 1.7.2 Denial of Service Attacks; 1.7.3 Code Security; 1.7.4 Steganography; 1.8 Conclusion; Chapter 2: Network Security Protocols; 2.1 Introduction; 2.2 Key Establishment Protocols; 2.2.1 Key Generation in SKC; 2.2.2 Key Distribution in SKC; 2.2.3 Key Establishment in PKC; 2.2.4 Diffie-Hellman Key Exchange; 2.2.5 Enhanced Diffie-Hellman Key Exchange; 2.2.6 RSA; 2.3 Authentication Protocols; 2.3.1 Address-Based Authentication; 2.3.2 Passwords for Local Authentication (Login); 2.3.3 Passwords for Network Authentication; 2.3.4 Authentication Using SKC
2.3.5 Authentication Using PKC2.3.6 What to Use for Authentication: SKC or PKC?; 2.3.7 Session Hijacking; 2.3.8 Needham Schroeder; 2.3.9 Kerberos; 2.4 Encryption Protocols; 2.4.1 DES; 2.4.2 TripleDES or 3DES; 2.4.3 AES; 2.4.4 RC4; 2.5 Integrity Protocols; 2.5.1 CBC Residue; 2.5.2 CRC32; 2.5.3 MD5; Chapter 3: Security and the Layered Architecture; 3.1 Introduction; 3.2 Security at Layer 1; 3.3 Security at Layer 2; 3.3.1 Extensible Authentication Protocol (EAP); 3.3.2 EAPoL: EAP Over LAN; 3.3.3 EAP-TLS: TLS Handshake Over EAP; 3.4 Security at Layer 3; 3.5 Security at Layer 4: SSL/TLS
3.6 Security at Layer 5+Chapter 4: Voice-Oriented Wireless Networks; 4.1 The Wireless Medium; 4.1.1 Radio Propagation Effects; 4.1.2 Hidden Terminal Problem; 4.1.3 Exposed Terminal Problem; 4.1.4 Bandwidth; 4.1.5 Other Constraints; 4.2 The Cellular Architecture; 4.3 TWNs: First Generation; 4.3.1 Addresses in AMPS; 4.3.2 Call Setup in AMPS; 4.4 TWNs: Second Generation; 4.4.1 Addresses in GSM; 4.4.2 Call Setup in GSM; 4.5 TWNs: Third Generation; 4.5.1 Connection Setup in UMTS; 4.6 The Overall Picture; Chapter 5: Data-Oriented Wireless Networks; 5.1 WLANs; 5.1.1: Addresses in 802.11
5.1.2 Connection Setup in 802.115.1.3 Media Access; 5.1.4 Spectrum Efficiency in 802.11; 5.2 MANETs; 5.2.1 MAC for MANETs; 5.2.2 Routing in MANETs.; 5.2.3 Address Allocation in MANETs; 5.2.4 Security in MANETs; 5.3 Wireless Networks in the Near Future; Chapter 6: Security in Traditional Wireless Networks; 6.1 Security in First Generation TWNs; 6.2 Security in Second Generation TWNs; 6.2.1 Anonymity in GSM; 6.2.2 Key Establishment in GSM; 6.2.3 Authentication in GSM; 6.2.4 Confidentiality in GSM; 6.2.5 What's Wrong with GSM Security?; 6.3 Security in 2.5 Generation TWNs; 6.3.1 WAP
6.3.2 Code Security
Record Nr. UNINA-9910784359303321
Chandra Praphul  
Amsterdam ; ; Oxford, : Newnes, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bulletproof wireless security : GSM, UMTS, 802.11 and ad hoc security / / by Praphul Chandra
Bulletproof wireless security : GSM, UMTS, 802.11 and ad hoc security / / by Praphul Chandra
Autore Chandra Praphul
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Oxford, : Newnes, 2005
Descrizione fisica 1 online resource (272 p.)
Disciplina 005.8
Collana Communications engineering series
Soggetto topico Wireless communication systems - Security measures
Wireless LANs - Security measures
Global system for mobile communications - Security measures
Universal Mobile Telecommunications System - Security measures
IEEE 802.11 (Standard)
ISBN 1-281-00975-X
9786611009755
0-08-047631-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1.7 Beyond Cryptography1.7.1 Firewalls; 1.7.2 Denial of Service Attacks; 1.7.3 Code Security; 1.7.4 Steganography; 1.8 Conclusion; Chapter 2: Network Security Protocols; 2.1 Introduction; 2.2 Key Establishment Protocols; 2.2.1 Key Generation in SKC; 2.2.2 Key Distribution in SKC; 2.2.3 Key Establishment in PKC; 2.2.4 Diffie-Hellman Key Exchange; 2.2.5 Enhanced Diffie-Hellman Key Exchange; 2.2.6 RSA; 2.3 Authentication Protocols; 2.3.1 Address-Based Authentication; 2.3.2 Passwords for Local Authentication (Login); 2.3.3 Passwords for Network Authentication; 2.3.4 Authentication Using SKC
2.3.5 Authentication Using PKC2.3.6 What to Use for Authentication: SKC or PKC?; 2.3.7 Session Hijacking; 2.3.8 Needham Schroeder; 2.3.9 Kerberos; 2.4 Encryption Protocols; 2.4.1 DES; 2.4.2 TripleDES or 3DES; 2.4.3 AES; 2.4.4 RC4; 2.5 Integrity Protocols; 2.5.1 CBC Residue; 2.5.2 CRC32; 2.5.3 MD5; Chapter 3: Security and the Layered Architecture; 3.1 Introduction; 3.2 Security at Layer 1; 3.3 Security at Layer 2; 3.3.1 Extensible Authentication Protocol (EAP); 3.3.2 EAPoL: EAP Over LAN; 3.3.3 EAP-TLS: TLS Handshake Over EAP; 3.4 Security at Layer 3; 3.5 Security at Layer 4: SSL/TLS
3.6 Security at Layer 5+Chapter 4: Voice-Oriented Wireless Networks; 4.1 The Wireless Medium; 4.1.1 Radio Propagation Effects; 4.1.2 Hidden Terminal Problem; 4.1.3 Exposed Terminal Problem; 4.1.4 Bandwidth; 4.1.5 Other Constraints; 4.2 The Cellular Architecture; 4.3 TWNs: First Generation; 4.3.1 Addresses in AMPS; 4.3.2 Call Setup in AMPS; 4.4 TWNs: Second Generation; 4.4.1 Addresses in GSM; 4.4.2 Call Setup in GSM; 4.5 TWNs: Third Generation; 4.5.1 Connection Setup in UMTS; 4.6 The Overall Picture; Chapter 5: Data-Oriented Wireless Networks; 5.1 WLANs; 5.1.1: Addresses in 802.11
5.1.2 Connection Setup in 802.115.1.3 Media Access; 5.1.4 Spectrum Efficiency in 802.11; 5.2 MANETs; 5.2.1 MAC for MANETs; 5.2.2 Routing in MANETs.; 5.2.3 Address Allocation in MANETs; 5.2.4 Security in MANETs; 5.3 Wireless Networks in the Near Future; Chapter 6: Security in Traditional Wireless Networks; 6.1 Security in First Generation TWNs; 6.2 Security in Second Generation TWNs; 6.2.1 Anonymity in GSM; 6.2.2 Key Establishment in GSM; 6.2.3 Authentication in GSM; 6.2.4 Confidentiality in GSM; 6.2.5 What's Wrong with GSM Security?; 6.3 Security in 2.5 Generation TWNs; 6.3.1 WAP
6.3.2 Code Security
Record Nr. UNINA-9910824458503321
Chandra Praphul  
Amsterdam ; ; Oxford, : Newnes, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
UMTS security [[electronic resource] /] / by Valterri Niemi and Kaisa Nyberg
UMTS security [[electronic resource] /] / by Valterri Niemi and Kaisa Nyberg
Autore Niemi Valtteri
Pubbl/distr/stampa Chichester, England, : John Wiley & Sons, 2003
Descrizione fisica 1 online resource (287 p.)
Disciplina 005.8
621.38456
Altri autori (Persone) NybergKaisa <1948->
Soggetto topico Computer security
Computer networks - Security measures
Mobile communication systems - Security measures
Wireless communication systems - Security measures
Global system for mobile communications - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-280-26914-6
9786610269143
0-470-09158-4
0-470-09156-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Universal Mobile Telecommunications System Security; Contents; Preface; PART I: SECURITY ARCHITECTURE FOR UMTS; 1 Introduction to Security and to UMTS; 1.1 Security in Telecommunications; 1.1.1 General security principles; 1.1.2 GSM security; 1.2 The Background to 3G; 1.3 The 3G Partnership Project (3GPP); 1.4 3GPP Network Architecture; 1.4.1 Elements in the architecture; 1.4.2 Protocols in the 3GPP system; 1.5 WCDMA Radio Technology; 1.5.1 CDMA: an example; 1.5.2 Basic facts of WCDMA; 1.5.3 Handovers; 1.5.4 Power control; 2 UMTS Security Features in Release 1999; 2.1 Access Security to UMTS
2.1.1 Mutual authentication2.1.2 Temporary identities; 2.1.3 UTRAN encryption; 2.1.4 Integrity protection of RRC signalling; 2.1.5 Set-up of UTRAN security mechanisms; 2.1.6 Summary of access security in the CS and PS domains; 2.2 Interworking with GSM; 2.2.1 Interworking scenarios; 2.2.2 Cases with SIM; 2.2.3 Cases with USIM; 2.2.4 Handovers from one system to another; 2.3 Additional Security Features in Release 1999; 2.3.1 Ciphering indicator; 2.3.2 Identification of the UE; 2.3.3 Security for Location Services (LCs); 2.3.4 User-to-USIM authentication
2.3.5 Security in the USIM application toolkit2.3.6 Mobile Execution Environment (MExE); 2.3.7 Lawful interception; 3 Security Features in Releases 4 and 5; 3.1 Network Domain Security; 3.1.1 MAPsec; 3.1.2 IPsec; 3.1.3 IPsec-based mechanisms in UMTS; 3.1.4 Role of firewalls; 3.2 IMS Security; 3.2.1 Basics of SIP; 3.2.2 IMS architecture; 3.2.3 Architecture for securing access to the IMS; 3.2.4 Principles for IMS access security; 3.2.5 Use of HTTP Digest AKA; 3.2.6 Security mode set-up; 3.2.7 Integrity protection with ESP; 3.2.8 Error case handling; 3.3 Other Security Systems
3.3.1 Higher layer security systems3.3.2 Link layer security systems; PART II: CRYPTOGRAPHIC ALGORITHMS; 4 Introduction to Cryptography; 4.1 The Science of Cryptology; 4.1.1 Cryptographic systems; 4.1.2 Security and vulnerability; 4.1.3 Developing cryptology into a publicly available science; 4.1.4 Public cryptographic development efforts; 4.2 Requirements and Analysis of Cryptographic Algorithms; 4.2.1 Block ciphers; 4.2.2 Stream ciphers; 4.2.3 Message authentication codes; 5 3GPP Algorithm Specification Principles; 6 Confidentiality and Integrity Algorithms
6.1 Requirements for the Confidentiality Algorithm6.1.1 Functional requirements; 6.1.2 Algorithm operation; 6.1.3 Interfaces to the algorithm; 6.2 Requirements for the Integrity Algorithm; 6.2.1 Overview; 6.2.2 Interface; 6.3 Design Task Force; 6.4 Getting Started; 6.4.1 SAGE contribution to SA3; 6.4.2 Modes around MISTY1; 6.4.3 Particular security criteria; 6.5 Design Process; 6.5.1 The teams; 6.5.2 Design documentation; 6.5.3 Conclusion of evaluation; 6.6 Confidentiality Algorithm; 6.6.1 The f8 stream cipher mode; 6.6.2 Description of f8; 6.6.3 Security
6.7 Extension of the UMTS Confidentiality Algorithm
Record Nr. UNINA-9910143743603321
Niemi Valtteri  
Chichester, England, : John Wiley & Sons, 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
UMTS security [[electronic resource] /] / by Valterri Niemi and Kaisa Nyberg
UMTS security [[electronic resource] /] / by Valterri Niemi and Kaisa Nyberg
Autore Niemi Valtteri
Pubbl/distr/stampa Chichester, England, : John Wiley & Sons, 2003
Descrizione fisica 1 online resource (287 p.)
Disciplina 005.8
621.38456
Altri autori (Persone) NybergKaisa <1948->
Soggetto topico Computer security
Computer networks - Security measures
Mobile communication systems - Security measures
Wireless communication systems - Security measures
Global system for mobile communications - Security measures
ISBN 1-280-26914-6
9786610269143
0-470-09158-4
0-470-09156-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Universal Mobile Telecommunications System Security; Contents; Preface; PART I: SECURITY ARCHITECTURE FOR UMTS; 1 Introduction to Security and to UMTS; 1.1 Security in Telecommunications; 1.1.1 General security principles; 1.1.2 GSM security; 1.2 The Background to 3G; 1.3 The 3G Partnership Project (3GPP); 1.4 3GPP Network Architecture; 1.4.1 Elements in the architecture; 1.4.2 Protocols in the 3GPP system; 1.5 WCDMA Radio Technology; 1.5.1 CDMA: an example; 1.5.2 Basic facts of WCDMA; 1.5.3 Handovers; 1.5.4 Power control; 2 UMTS Security Features in Release 1999; 2.1 Access Security to UMTS
2.1.1 Mutual authentication2.1.2 Temporary identities; 2.1.3 UTRAN encryption; 2.1.4 Integrity protection of RRC signalling; 2.1.5 Set-up of UTRAN security mechanisms; 2.1.6 Summary of access security in the CS and PS domains; 2.2 Interworking with GSM; 2.2.1 Interworking scenarios; 2.2.2 Cases with SIM; 2.2.3 Cases with USIM; 2.2.4 Handovers from one system to another; 2.3 Additional Security Features in Release 1999; 2.3.1 Ciphering indicator; 2.3.2 Identification of the UE; 2.3.3 Security for Location Services (LCs); 2.3.4 User-to-USIM authentication
2.3.5 Security in the USIM application toolkit2.3.6 Mobile Execution Environment (MExE); 2.3.7 Lawful interception; 3 Security Features in Releases 4 and 5; 3.1 Network Domain Security; 3.1.1 MAPsec; 3.1.2 IPsec; 3.1.3 IPsec-based mechanisms in UMTS; 3.1.4 Role of firewalls; 3.2 IMS Security; 3.2.1 Basics of SIP; 3.2.2 IMS architecture; 3.2.3 Architecture for securing access to the IMS; 3.2.4 Principles for IMS access security; 3.2.5 Use of HTTP Digest AKA; 3.2.6 Security mode set-up; 3.2.7 Integrity protection with ESP; 3.2.8 Error case handling; 3.3 Other Security Systems
3.3.1 Higher layer security systems3.3.2 Link layer security systems; PART II: CRYPTOGRAPHIC ALGORITHMS; 4 Introduction to Cryptography; 4.1 The Science of Cryptology; 4.1.1 Cryptographic systems; 4.1.2 Security and vulnerability; 4.1.3 Developing cryptology into a publicly available science; 4.1.4 Public cryptographic development efforts; 4.2 Requirements and Analysis of Cryptographic Algorithms; 4.2.1 Block ciphers; 4.2.2 Stream ciphers; 4.2.3 Message authentication codes; 5 3GPP Algorithm Specification Principles; 6 Confidentiality and Integrity Algorithms
6.1 Requirements for the Confidentiality Algorithm6.1.1 Functional requirements; 6.1.2 Algorithm operation; 6.1.3 Interfaces to the algorithm; 6.2 Requirements for the Integrity Algorithm; 6.2.1 Overview; 6.2.2 Interface; 6.3 Design Task Force; 6.4 Getting Started; 6.4.1 SAGE contribution to SA3; 6.4.2 Modes around MISTY1; 6.4.3 Particular security criteria; 6.5 Design Process; 6.5.1 The teams; 6.5.2 Design documentation; 6.5.3 Conclusion of evaluation; 6.6 Confidentiality Algorithm; 6.6.1 The f8 stream cipher mode; 6.6.2 Description of f8; 6.6.3 Security
6.7 Extension of the UMTS Confidentiality Algorithm
Record Nr. UNINA-9910830826703321
Niemi Valtteri  
Chichester, England, : John Wiley & Sons, 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
UMTS security / / by Valterri Niemi and Kaisa Nyberg
UMTS security / / by Valterri Niemi and Kaisa Nyberg
Autore Niemi Valtteri
Pubbl/distr/stampa Chichester, England, : John Wiley & Sons, 2003
Descrizione fisica 1 online resource (287 p.)
Disciplina 005.8
Altri autori (Persone) NybergKaisa <1948->
Soggetto topico Computer security
Computer networks - Security measures
Mobile communication systems - Security measures
Wireless communication systems - Security measures
Global system for mobile communications - Security measures
ISBN 1-280-26914-6
9786610269143
0-470-09158-4
0-470-09156-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Universal Mobile Telecommunications System Security; Contents; Preface; PART I: SECURITY ARCHITECTURE FOR UMTS; 1 Introduction to Security and to UMTS; 1.1 Security in Telecommunications; 1.1.1 General security principles; 1.1.2 GSM security; 1.2 The Background to 3G; 1.3 The 3G Partnership Project (3GPP); 1.4 3GPP Network Architecture; 1.4.1 Elements in the architecture; 1.4.2 Protocols in the 3GPP system; 1.5 WCDMA Radio Technology; 1.5.1 CDMA: an example; 1.5.2 Basic facts of WCDMA; 1.5.3 Handovers; 1.5.4 Power control; 2 UMTS Security Features in Release 1999; 2.1 Access Security to UMTS
2.1.1 Mutual authentication2.1.2 Temporary identities; 2.1.3 UTRAN encryption; 2.1.4 Integrity protection of RRC signalling; 2.1.5 Set-up of UTRAN security mechanisms; 2.1.6 Summary of access security in the CS and PS domains; 2.2 Interworking with GSM; 2.2.1 Interworking scenarios; 2.2.2 Cases with SIM; 2.2.3 Cases with USIM; 2.2.4 Handovers from one system to another; 2.3 Additional Security Features in Release 1999; 2.3.1 Ciphering indicator; 2.3.2 Identification of the UE; 2.3.3 Security for Location Services (LCs); 2.3.4 User-to-USIM authentication
2.3.5 Security in the USIM application toolkit2.3.6 Mobile Execution Environment (MExE); 2.3.7 Lawful interception; 3 Security Features in Releases 4 and 5; 3.1 Network Domain Security; 3.1.1 MAPsec; 3.1.2 IPsec; 3.1.3 IPsec-based mechanisms in UMTS; 3.1.4 Role of firewalls; 3.2 IMS Security; 3.2.1 Basics of SIP; 3.2.2 IMS architecture; 3.2.3 Architecture for securing access to the IMS; 3.2.4 Principles for IMS access security; 3.2.5 Use of HTTP Digest AKA; 3.2.6 Security mode set-up; 3.2.7 Integrity protection with ESP; 3.2.8 Error case handling; 3.3 Other Security Systems
3.3.1 Higher layer security systems3.3.2 Link layer security systems; PART II: CRYPTOGRAPHIC ALGORITHMS; 4 Introduction to Cryptography; 4.1 The Science of Cryptology; 4.1.1 Cryptographic systems; 4.1.2 Security and vulnerability; 4.1.3 Developing cryptology into a publicly available science; 4.1.4 Public cryptographic development efforts; 4.2 Requirements and Analysis of Cryptographic Algorithms; 4.2.1 Block ciphers; 4.2.2 Stream ciphers; 4.2.3 Message authentication codes; 5 3GPP Algorithm Specification Principles; 6 Confidentiality and Integrity Algorithms
6.1 Requirements for the Confidentiality Algorithm6.1.1 Functional requirements; 6.1.2 Algorithm operation; 6.1.3 Interfaces to the algorithm; 6.2 Requirements for the Integrity Algorithm; 6.2.1 Overview; 6.2.2 Interface; 6.3 Design Task Force; 6.4 Getting Started; 6.4.1 SAGE contribution to SA3; 6.4.2 Modes around MISTY1; 6.4.3 Particular security criteria; 6.5 Design Process; 6.5.1 The teams; 6.5.2 Design documentation; 6.5.3 Conclusion of evaluation; 6.6 Confidentiality Algorithm; 6.6.1 The f8 stream cipher mode; 6.6.2 Description of f8; 6.6.3 Security
6.7 Extension of the UMTS Confidentiality Algorithm
Record Nr. UNINA-9910877732903321
Niemi Valtteri  
Chichester, England, : John Wiley & Sons, 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui