Cargando…

Wireless Communications Security : Solutions for the Internet of Things.

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Penttinen, Jyrki T. J.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Newark : Wiley, 2016.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Title Page; Table of Contents; About the Author; Preface; Acknowledgements; Abbreviations; 1 Introduction; 1.1 Introduction; 1.2 Wireless Security; 1.3 Standardization; 1.4 Wireless Security Principles; 1.5 Focus and Contents of the Book; References; 2 Security of Wireless Systems; 2.1 Overview; 2.2 Effects of Broadband Mobile Data; 2.3 GSM; 2.4 UMTS/HSPA; 2.5 Long Term Evolution; 2.6 Security Aspects of Other Networks; 2.7 Interoperability; References; 3 Internet of Things; 3.1 Overview; 3.2 Foundation; 3.3 Development of IoT; 3.4 Technical Description of IoT; References.
  • 4 Smartcards and Secure Elements4.1 Overview; 4.2 Role of Smartcards and SEs; 4.3 Contact Cards; 4.4 The SIM/UICC; 4.5 Contents of the SIM; 4.6 Embedded SEs; 4.7 Other Card Types; 4.8 Contactless Cards; 4.9 Electromechanical Characteristics of Smartcards; 4.10 Smartcard SW; 4.11 UICC Communications; References; 5 Wireless Payment and Access Systems; 5.1 Overview; 5.2 Wireless Connectivity as a Base for Payment and Access; 5.3 E-commerce; 5.4 Transport; 5.5 Other Secure Systems; References; 6 Wireless Security Platforms and Functionality; 6.1 Overview; 6.2 Forming the Base.
  • 6.3 Remote Subscription Management6.4 Tokenization; 6.5 Other Solutions; References; 7 Mobile Subscription Management; 7.1 Overview; 7.2 Subscription Management; 7.3 OTA Platforms; 7.4 Evolved Subscription Management; References; 8 Security Risks in the Wireless Environment; 8.1 Overview; 8.2 Wireless Attack Types; 8.3 Security Flaws on Mobile Networks; 8.4 Protection Methods; 8.5 Errors in Equipment Manufacturing; 8.6 Self-Organizing Network Techniques for Test and Measurement; References; 9 Monitoring and Protection Techniques; 9.1 Overview; 9.2 Personal Devices.
  • 9.3 IP Core Protection Techniques9.4 HW Fault and Performance Monitoring; 9.5 Security Analysis; 9.6 Virus Protection; 9.7 Legal Interception; 9.8 Personal Safety and Privacy; References; 10 Future of Wireless Solutions and Security; 10.1 Overview; 10.2 IoT as a Driving Force; 10.3 Evolution of 4G; 10.4 Development of Devices; 10.5 5G Mobile Communications; References; Index; End User License Agreement.