LTE Security.
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
John Wiley & Sons
2010.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover13;
- Contents
- Foreword
- Acknowledgements
- 1 Overview of the Book
- 2 Background
- 2.1 Evolution of Cellular Systems
- 2.1.1 Third-generation Network Architecture
- 2.1.2 Important Elements of the 3G Architecture
- 2.1.3 Functions and Protocols in the 3GPP System
- 2.1.4 The EPS System
- 2.2 Basic Security Concepts
- 2.2.1 Information Security
- 2.2.2 Design Principles
- 2.2.3 Communication Security Features
- 2.3 Basic Cryptographic Concepts
- 2.3.1 Cryptographic Functions
- 2.3.2 Securing Systems with Cryptographic Methods
- 2.3.3 Symmetric Encryption Methods
- 2.3.4 Hash Functions
- 2.3.5 Public-key Cryptography and PKI
- 2.3.6 Cryptanalysis
- 2.4 Introduction to LTE Standardization
- 2.4.1 Working Procedures in 3GPP
- 2.5 Notes on Terminology and Specification Language
- 2.5.1 Terminology
- 2.5.2 Specification Language
- 3 GSM Security
- 3.1 Principles of GSM Security
- 3.2 The Role of the SIM
- 3.3 Mechanisms of GSM Security
- 3.3.1 Subscriber Authentication in GSM
- 3.3.2 GSM Encryption
- 3.3.3 GPRS Encryption
- 3.3.4 Subscriber Identity Confidentiality
- 3.4 GSM Cryptographic Algorithms
- 4 Third-generation Security (UMTS)
- 4.1 Principles of Third-generation Security
- 4.1.1 Elements of GSM Security Carried Over to 3G
- 4.1.2 Weaknesses in GSM Security
- 4.1.3 Higher Level Objectives
- 4.2 Third-generation Security Mechanisms
- 4.2.1 Authentication and Key Agreement
- 4.2.2 Ciphering Mechanism
- 4.2.3 Integrity Protection Mechanism
- 4.2.4 Identity Confidentiality Mechanism
- 4.3 Third-generation Cryptographic Algorithms
- 4.3.1 KASUMI
- 4.3.2 UEA1 and UIA1
- 4.3.3 SNOW3G, UEA2 and UIA2
- 4.3.4 MILENAGE
- 4.3.5 Hash Functions
- 4.4 Interworking between GSM and 3G security
- 4.4.1 Interworking Scenarios
- 4.4.2 Cases with SIM
- 4.4.3 Cases with USIM
- 4.4.4 Handovers between GSM and 3G
- 4.5 Network Domain Security
- 4.5.1 Generic Security Domain Framework
- 4.5.2 Security Mechanisms for NDS
- 4.5.3 Application of NDS
- 5 3G8211;WLAN Interworking
- 5.1 Principles of 3G8211;WLAN Interworking
- 5.1.1 The General Idea
- 5.1.2 The EAP Framework
- 5.1.3 Overview of EAP-AKA
- 5.2 Security Mechanisms of 3G8211;WLAN Interworking
- 5.2.1 Reference Model for 3G8211;WLAN Interworking
- 5.2.2 Security Mechanisms of WLAN Direct IP Access
- 5.2.3 Security Mechanisms of WLAN 3GPP IP Access
- 5.3 Cryptographic Algorithms for 3G8211;WLAN Interworking
- 6 EPS Security Architecture
- 6.1 Overview and Relevant Specifications
- 6.1.1 Need for Security Standardization
- 6.1.2 Relevant Non-security Specifications
- 6.1.3 Security Specifications for EPS
- 6.2 Requirements and Features of EPS Security
- 6.2.1 Threats against EPS
- 6.2.2 EPS Security Features
- 6.2.3 How the Features Meet the Requirements
- 6.3 Design Decisions for EPS Security
- 6.4 Platform Security for Base Stations
- 6.4.1 General Security Considerations
- 6.4.2 Specification of Platform Security
- 6.4.3 Exposed Position and Threats
- 6.4.4 Security Requirements
- 7 EPS Authentication and Key Agreement
- 7.1 Identification
- 7.1.1 User Identity Confidentiality
- 7.1.2 Terminal Identity Confidentiality
- 7.2 The EPS Authentication and Key Agreement.