Security in next generation mobile networks : SAE/LTE and WiMAX /
This book provides a fresh look at those security aspects, with main focus on the latest security developments of 3GPP SAE/LTE and WiMAX. SAE/LTE is also known as Evolved Packet System (EPS).
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Aalborg, Denmark :
River Publishers,
2011.
|
Colección: | River Publishers series of information science and technology ;
Volume 4. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover; Contents; Dedication; About the Authors; Preface; 1 Introduction; 1.1 NGMN; 1.1.1 Overview; 1.1.2 Security Requirements; 1.2 Book Overview; References; 2 Security Overview; 2.1 Objectives of Information Security; 2.1.1 Confidentiality; 2.1.2 Integrity; 2.1.3 Availability; 2.2 Types of Security Attacks; 2.2.1 Types of Attacks on Networks; 2.2.2 Security on Networks; 2.3 Basic Security Functions; 2.3.1 Authentication and Authorization; 2.3.2 Message Encryption; 2.3.3 Digital Signature; 2.3.4 Nonrepudiation; 2.3.5 Privacy Guarantee; 2.4 Cryptographic Primitives.
- 2.4.1 Symmetric-Key Cryptography Algorithm2.4.2 Hash Function and MAC; 2.4.3 Public-Key Cryptography Algorithm; 2.4.4 Random Number Generator; 2.4.5 Key Management; 2.4.6 Cryptographic Protocol; 2.4.7 Comments; 2.5 Extensible Authentication Protocol; 2.5.1 General EAP Architecture; 2.5.2 EAP Authentication Methods; 2.6 AAA Protocols; 2.6.1 RADIUS; 2.6.2 Diameter; 2.7 Conclusion; References; 3 Standardization; 3.1 3GPP; 3.1.1 Organization; 3.1.2 Standardization Process; 3.1.3 Evolution: 3GPP Network and Security; 3.2 IEEE 802.16 and WiMAX; 3.2.1 IEEE 802.16 Standards; 3.2.2 WiMAX Forum®
- 3.2.3 WiMAX Technology Evolution3.2.4 Security Overview in WiMAX; References; 4 System Architecture and Long-Term Evolution Security; 4.1 Chapter Overview; 4.2 EPS System Overview; 4.2.1 Network Elements and Security Functions; 4.2.2 Protocol Layers and Security Functions; 4.3 Network Attachment; 4.4 Tracking Area; 4.5 Mobility; 4.6 Idle State Signaling Reduction; 4.7 EPS Identities; 4.8 Security Requirements; 4.9 Basic Points; 4.9.1 Key Hierarchy and Key Lifetime; 4.9.2 Security Contexts; 4.9.3 NAS Counts and Handling; 4.9.4 Cryptographic Algorithms and Usage Overview.
- 4.10 Authentication and Key Agreement (AKA)4.10.1 Basic Requirements; 4.10.2 Authentication Decision and Context Retrieval; 4.10.3 Authentication Procedure; 4.11 Algorithm Negotiation and Security Activation; 4.11.1 Algorithm Negotiation Requirements; 4.11.2 Non-access Stratum; 4.11.3 Access Stratum; 4.12 Key Handling at State Change; 4.13 Handover Key Handling; 4.14 Key Change On-The-Fly; 4.15 Connection Reestablishment: Token; 4.16 Local Authentication; 4.17 Inter-System Mobility; 4.17.1 Idle-Mode Mobility; 4.17.2 Handover; 4.18 Voice Call Continuity; 4.19 Emergency Call Security.