LTE Security

LTE Security
-0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.
 E-Book
Sofort lieferbar | Lieferzeit: Sofort lieferbar

Unser bisheriger Preis:ORGPRICE: 117,41 €

Jetzt 95,99 €* E-Book

Artikel-Nr:
9781118380673
Veröffentl:
2012
Einband:
E-Book
Seiten:
368
Autor:
Dan Forsberg
eBook Typ:
PDF
eBook Format:
Reflowable E-Book
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

A concise, updated guide to the 3GPP LTE Security Standardization specifications A welcome Revised Edition of the successful LTE Security addressing the security architecture for SAE/LTE, which is based on elements of the security architectures for GSM and 3G, but which needed a major redesign due to the significantly increased complexity, and different architectural and business requirements of fourth generation systems. The authors explain in detail the security mechanisms employed to meet these requirements. The specifications generated by standardization bodies only inform about how to implement the system (and this only to the extent required for interoperability), but almost never inform readers about why things are done the way they are. Furthermore, specifications tend to be readable only for a small group of experts and lack the context of the broader picture. The book fills this gap by providing first hand information from insiders who participated in decisively shaping SAE/LTE security in the relevant standardization body, 3GPP, and can therefore explain the rationale for design decisions in this area. A concise, fully updated guide to the 3GPP LTE Security Standardization specifications Describes the essential elements of LTE and SAE Security, written by leading experts who participated in decisively shaping SAE/LTE security in the relevant standardization body, 3GPP Explains the rationale behind the standards specifications giving readers a broader understanding of the context to these specifications Includes new chapters covering 3GPP work on system enhancements for MTC, plus application layer security in ETSI TC M2M and embedded smart card in ETSI SCP; Security for Machine-type Communication, Relay Node Security, and Future Challenges, including Voice over LTE, MTC, Home base stations, LIPA/SIPTO, and New Cryptographic Algorithms Essential reading for System engineers, developers and people in technical sales working in the area of LTE and LTE security, communication engineers and software developers in mobile communication field.
A concise, updated guide to the 3GPP LTE SecurityStandardization specificationsA welcome Revised Edition of the successful LTE Securityaddressing the security architecture for SAE/LTE, which is based onelements of the security architectures for GSM and 3G, but whichneeded a major redesign due to the significantly increasedcomplexity, and different architectural and business requirementsof fourth generation systems. The authors explain in detailthe security mechanisms employed to meet these requirements. Thespecifications generated by standardization bodies only informabout how to implement the system (and this only to the extentrequired for interoperability), but almost never inform readersabout why things are done the way they are. Furthermorespecifications tend to be readable only for a small group ofexperts and lack the context of the broader picture. The book fillsthis gap by providing first hand information from insiders whoparticipated in decisively shaping SAE/LTE security in the relevantstandardization body, 3GPP, and can therefore explain the rationalefor design decisions in this area.* A concise, fully updated guide to the 3GPP LTE SecurityStandardization specifications* Describes the essential elements of LTE and SAE Securitywritten by leading experts who participated in decisively shapingSAE/LTE security in the relevant standardization body, 3GPP* Explains the rationale behind the standards specificationsgiving readers a broader understanding of the context to thesespecifications* Includes new chapters covering 3GPP work on system enhancementsfor MTC, plus application layer security in ETSI TC M2M andembedded smart card in ETSI SCP; Security for Machine-typeCommunication, Relay Node Security, and Future Challengesincluding Voice over LTE, MTC, Home base stationsLIPA/SIPTO, and New Cryptographic AlgorithmsEssential reading for System engineers, developers and people intechnical sales working in the area of LTE and LTE securitycommunication engineers and software developers in mobilecommunication field.
Preface xiiiForeword to the First Edition xvAcknowledgements xixCopyright Acknowledgements xix1 Overview of the Book 12 Background 52.1 Evolution of Cellular Systems 52.2 Basic Security Concepts 102.3 Basic Cryptographic Concepts 132.4 Introduction to LTE Standardization 212.5 Notes on Terminology and Specification Language 263 GSM Security 293.1 Principles of GSM Security 293.2 The Role of the SIM 303.3 Mechanisms of GSM Security 313.4 GSM Cryptographic Algorithms 344 Third-Generation Security (UMTS) 374.1 Principles of Third-Generation (3G) Security 374.2 Third-Generation Security Mechanisms 404.3 Third-Generation Cryptographic Algorithms 494.4 Interworking between GSM and 3G Security 554.5 Network Domain Security 594.6 Architectures with RNCs in Exposed Locations 655 3G-WLAN Interworking 675.1 Principles of 3G-WLAN Interworking 675.2 Security Mechanisms of 3G-WLAN Interworking 755.3 Cryptographic Algorithms for 3G-WLAN Interworking816 EPS Security Architecture 836.1 Overview and Relevant Specifications 836.2 Requirements and Features of EPS Security 896.3 Design Decisions for EPS Security 976.4 Platform Security for Base Stations 1037 EPS Authentication and Key Agreement 1097.1 Identification 1097.2 The EPS Authentication and Key Agreement Procedure 1127.3 Key Hierarchy 1237.4 Security Contexts 1298 EPS Protection for Signalling and User Data 1338.1 Security Algorithms Negotiation 1338.2 NAS Signalling Protection 1368.3 AS Signalling and User Data Protection 1388.4 Security on Network Interfaces 1418.5 Certificate Enrolment for Base Stations 1438.6 Emergency Call Handling 1519 Security in Intra-LTE State Transitions and Mobility1559.1 Transitions to and from Registered State 1569.2 Transitions between Idle and Connected States 1579.3 Idle State Mobility 1589.4 Handover 1619.5 Key Change on the Fly 1699.6 Periodic Local Authentication Procedure 1709.7 Concurrent Run of Security Procedures 17110 EPS Cryptographic Algorithms 17510.1 Null Algorithms 17610.2 Ciphering Algorithms 17710.3 Integrity Algorithms 18010.4 Key Derivation Algorithms 18011 Interworking Security between EPS and Other Systems18311.1 Interworking with GSM and 3G Networks 18311.2 Interworking with Non-3GPP Networks 19312 Security for Voice over LTE 21512.1 Methods for Providing Voice over LTE 21512.2 Security Mechanisms for Voice over LTE 22012.3 Rich Communication Suite and Voice over LTE 23013 Security for Home Base Station Deployment 23313.1 Security Architecture, Threats and Requirements 23413.2 Security Features 24113.3 Security Procedures Internal to the Home Base Station24413.4 Security Procedures between Home Base Station and SecurityGateway 24713.5 Security Aspects of Home Base Station Management 26113.6 Closed Subscriber Groups and Emergency Call Handling27513.7 Support for Subscriber Mobility 27714 Relay Node Security 28114.1 Overview of Relay Node Architecture 28114.2 Security Solution 28415 Security for Machine-Type Communications 29315.1 Security for MTC at the Application Level 29415.2 Security for MTC at the 3GPP Network Level 30115.3 Security for MTC at the Credential Management Level 30616 Future Challenges 30916.1 Near-Term Outlook 30916.2 Far-Term Outlook 314Abbreviations 319References 327Index 337

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.