Buy LTE Security Book by Valtteri Niemi - Bookswagon UAE
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > LTE Security
LTE Security

LTE Security


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms employed to meet these requirements. Whilst the industry standards inform how to implement systems, they do not provide readers with the underlying principles behind security specifications. LTE Security fills this gap by providing first hand information from 3GPP insiders who explain the rationale for design decisions. Key features: Provides a concise guide to the 3GPP/LTE Security Standardization specifications Authors are leading experts who participated in decisively shaping SAE/LTE security in the relevant standardization body, 3GPP Shows how GSM and 3G security was enhanced and extended to meet the requirements of fourth generation systems Gives the rationale behind the standards specifications enabling readers to have a broader understanding of the context of these specifications Explains why LTE security solutions are designed as they are and how theoretical security mechanisms can be put to practical use

Table of Contents:
Foreword. Acknowledgements. 1 Overview of the Book. 2 Background. 2.1 Evolution of Cellular Systems. 2.2 Basic Security Concepts. 2.3 Basic Cryptographic Concepts. 2.4 Introduction to LTE Standardization. 2.5 Notes on Terminology and Specification Language. 3 GSM Security. 3.1 Principles of GSM Security. 3.2 The Role of the SIM. 3.4 GSM Cryptographic Algorithms. 4 Third-generation Security (UMTS). 4.1 Principles of Third-generation Security. 4.2 Third-generation Security Mechanisms. 4.3 Third-generation Cryptographic Algorithms. 4.4 Interworking between GSM and 3G security. 4.5 Network Domain Security. 5 3G–WLAN Interworking. 5.1 Principles of 3G–WLAN Interworking. 5.2 Security Mechanisms of 3G–WLAN Interworking. 5.3 Cryptographic Algorithms for 3G–WLAN Interworking. 6 EPS Security Architecture. 6.1 Overview and Relevant Specifications. 6.2 Requirements and Features of EPS Security. 6.3 Design Decisions for EPS Security. 6.4 Platform Security for Base Stations. 7 EPS Authentication and Key Agreement. 7.1 Identification. 7.2 The EPS Authentication and Key Agreement Procedure. 7.3 Key Hierarchy. 7.4 Security Contexts. 8 EPS Protection for Signalling and User Data. 8.1 Security Algorithms Negotiation. 8.2 NAS Signalling Protection. 8.3 AS Signalling and User Data Protection. 8.4 Security on Network Interfaces. 8.5 Certificate Enrolment for Base Stations. 8.6 Emergency Call Handling. 9 Security in Intra-LTE State Transitions and Mobility. 9.1 Transitions to and from Registered State. 9.2 Transitions Between Idle and Connected States 149 9.3 Idle State Mobility. 9.4 Handover. 9.5 Key Change on the Fly. 9.6 Periodic Local Authentication Procedure. 9.7 Concurrent Run of Security Procedures. 10 EPS Cryptographic Algorithms. 10.1 Null Algorithms. 10.2 Ciphering Algorithms. 10.3 Integrity Algorithms. 10.4 Key Derivation Algorithms. 11 Interworking Security Between EPS and Other Systems. 11.1 Interworking with GSM and 3G Networks. 11.2 Interworking with Non-3GPP Networks. 12 Security for Voice over LTE. 12.1 Methods for Providing Voice over LTE. 12.2 Security Mechanisms for Voice over LTE. 13 Security for Home Base Station Deployment. 13.1 Security Architecture, Threats and Requirements. 13.2 Security Features. 13.3 Security Procedures Internal to the Home Base Station. 13.4 Security Procedures between Home Base Station and Security Gateway. 13.5 Security Aspects of Home Base Station Management. 13.6 Closed Subscriber Groups and Emergency Call Handling. 14 Future Challenges. 14.1 Near-term Outlook. 14.2 Far-term Outlook. Abbreviations. References. Index.

About the Author :
Dan Forsberg received a M.Sc. degree in Computer Science (software engineering and telecommunications software) from the Helsinki University of Technology, Finland, in March 2000. He was a core member and developer of The Dynamics - HUT Mobile IP software. He worked in Nokia Research Center in Helsinki from 2000 to 2009. At Nokia Dan was involved in and led many research projects focused on mobility and security for future mobile devices. He was active in IETF and authored some Internet-Drafts and one standards track RFC in the area of user to network interfaces (EAP, AAA, PANA). In recent years, the main focus of his work has been on the SAE/LTE security standardization in the 3GPP security group (SA3). Dan led the SAE/LTE security standardization in Nokia from around 2005 to 2009. He was also nominated as one of the Nokia top inventors in 2007-2008. Dan began his PhD studies while working at Nokia and has published several scientific papers in the area of "improving and distributing session key management for mobile networks". He joined Helsinki University of Technology in 2009 to finalize his PhD studies. Dan is also a skilled software engineer, a Unix and network administration expert and established his own company in 2010 for consulting on security and software development. Günther Horn received a PhD (Dr.rer.nat.) degree in Mathematics from the University of Tübingen, Germany, in 1985. He served as an Assistant Professor of Mathematics at the University of California at Irvine in 1985. He joined the Corporate Technology Labs of Siemens AG in Munich in 1986. In 2007, he joined Nokia Siemens Networks. He has been engaged in research on and standardization of new telecommunications systems, including security in mobile networks, fraud control, and mobile applications security. He has been active in many collaborative research projects sponsored by the European Union. In recent years, the focus of his work has been on the standardization of 3G security and SAE/LTE security in the 3GPP security group (SA3), of which he has been a member since it started in 1999. Before this, he contributed to ETSI SMG. He has published on communications security in conference proceedings, journals, and books. Wolf-Dietrich Moeller studied Physics and Electrical Engineering in Berlin, Glasgow and Munich. With his research work on semiconductor device technology at Technische Universität München (TUM) he received his Dr.-Ing. degree in 1977. In the same year he joined the Corporate Technology Labs of Siemens AG in Munich. After leading a research group on microprocessor architectures and VLSI chip design from 1983 until 1993, in recent years his main subject has been research in security for mobile communications, device integrity and security hardware. He has been active in European and German collaborative research projects, and contributes to the standardisation of mobile security in 3GPP. Since 2007 he has worked at Nokia Siemens Networks Research and Technology Labs in research, standardisation and systems engineering for fixed and mobile networks. Recently he contributed to the book Selected Topics in Communication Networks and Distributed Systems (forthcoming). Valtteri Niemi received a PhD degree in Mathematics from the University of Turku, Finland in 1989. After serving in various positions at University of Turku, he became an Associate Professor in Mathematics at the University of Vaasa, Finland, during 1993-97. He joined Nokia Research Center (NRC), Helsinki in 1997 where he has contributed in several roles for Nokia research in the wireless security area, including cryptological aspects. In 2008, he moved to the new NRC laboratory in Lausanne, Switzerland, where his main focus is on privacy-enhancing technologies. He was nominated as a Nokia Fellow in January 2009. He has participated to the 3GPP SA3 (security) standardization group from the beginning. During 2003-2009 he was the chairman of the group. Before 3GPP, Niemi took part in ETSI SMG 10 for GSM security work. He has published more than 40 scientific articles and he is a co-author of three books.

Review :
"It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic." (Headsets, 16 February 2011)  


Best Sellers


Product Details
  • ISBN-13: 9780470973271
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-Interscience
  • Height: 249 mm
  • No of Pages: 298
  • Weight: 662 gr
  • ISBN-10: 0470973277
  • Publisher Date: 04 Oct 2010
  • Binding: Digital online
  • Language: English
  • Spine Width: 22 mm
  • Width: 174 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
LTE Security
John Wiley & Sons Inc -
LTE Security
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

LTE Security

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!