Cargando…

LTE Security.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Horn, G?nther (Autor), Moeller, Wolf-Dietrich (Autor), Niemi, Valtteri (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: John Wiley & Sons 2010.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover13;
  • Contents
  • Foreword
  • Acknowledgements
  • 1 Overview of the Book
  • 2 Background
  • 2.1 Evolution of Cellular Systems
  • 2.1.1 Third-generation Network Architecture
  • 2.1.2 Important Elements of the 3G Architecture
  • 2.1.3 Functions and Protocols in the 3GPP System
  • 2.1.4 The EPS System
  • 2.2 Basic Security Concepts
  • 2.2.1 Information Security
  • 2.2.2 Design Principles
  • 2.2.3 Communication Security Features
  • 2.3 Basic Cryptographic Concepts
  • 2.3.1 Cryptographic Functions
  • 2.3.2 Securing Systems with Cryptographic Methods
  • 2.3.3 Symmetric Encryption Methods
  • 2.3.4 Hash Functions
  • 2.3.5 Public-key Cryptography and PKI
  • 2.3.6 Cryptanalysis
  • 2.4 Introduction to LTE Standardization
  • 2.4.1 Working Procedures in 3GPP
  • 2.5 Notes on Terminology and Specification Language
  • 2.5.1 Terminology
  • 2.5.2 Specification Language
  • 3 GSM Security
  • 3.1 Principles of GSM Security
  • 3.2 The Role of the SIM
  • 3.3 Mechanisms of GSM Security
  • 3.3.1 Subscriber Authentication in GSM
  • 3.3.2 GSM Encryption
  • 3.3.3 GPRS Encryption
  • 3.3.4 Subscriber Identity Confidentiality
  • 3.4 GSM Cryptographic Algorithms
  • 4 Third-generation Security (UMTS)
  • 4.1 Principles of Third-generation Security
  • 4.1.1 Elements of GSM Security Carried Over to 3G
  • 4.1.2 Weaknesses in GSM Security
  • 4.1.3 Higher Level Objectives
  • 4.2 Third-generation Security Mechanisms
  • 4.2.1 Authentication and Key Agreement
  • 4.2.2 Ciphering Mechanism
  • 4.2.3 Integrity Protection Mechanism
  • 4.2.4 Identity Confidentiality Mechanism
  • 4.3 Third-generation Cryptographic Algorithms
  • 4.3.1 KASUMI
  • 4.3.2 UEA1 and UIA1
  • 4.3.3 SNOW3G, UEA2 and UIA2
  • 4.3.4 MILENAGE
  • 4.3.5 Hash Functions
  • 4.4 Interworking between GSM and 3G security
  • 4.4.1 Interworking Scenarios
  • 4.4.2 Cases with SIM
  • 4.4.3 Cases with USIM
  • 4.4.4 Handovers between GSM and 3G
  • 4.5 Network Domain Security
  • 4.5.1 Generic Security Domain Framework
  • 4.5.2 Security Mechanisms for NDS
  • 4.5.3 Application of NDS
  • 5 3G8211;WLAN Interworking
  • 5.1 Principles of 3G8211;WLAN Interworking
  • 5.1.1 The General Idea
  • 5.1.2 The EAP Framework
  • 5.1.3 Overview of EAP-AKA
  • 5.2 Security Mechanisms of 3G8211;WLAN Interworking
  • 5.2.1 Reference Model for 3G8211;WLAN Interworking
  • 5.2.2 Security Mechanisms of WLAN Direct IP Access
  • 5.2.3 Security Mechanisms of WLAN 3GPP IP Access
  • 5.3 Cryptographic Algorithms for 3G8211;WLAN Interworking
  • 6 EPS Security Architecture
  • 6.1 Overview and Relevant Specifications
  • 6.1.1 Need for Security Standardization
  • 6.1.2 Relevant Non-security Specifications
  • 6.1.3 Security Specifications for EPS
  • 6.2 Requirements and Features of EPS Security
  • 6.2.1 Threats against EPS
  • 6.2.2 EPS Security Features
  • 6.2.3 How the Features Meet the Requirements
  • 6.3 Design Decisions for EPS Security
  • 6.4 Platform Security for Base Stations
  • 6.4.1 General Security Considerations
  • 6.4.2 Specification of Platform Security
  • 6.4.3 Exposed Position and Threats
  • 6.4.4 Security Requirements
  • 7 EPS Authentication and Key Agreement
  • 7.1 Identification
  • 7.1.1 User Identity Confidentiality
  • 7.1.2 Terminal Identity Confidentiality
  • 7.2 The EPS Authentication and Key Agreement.