Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Wireless Communications Security (eBook)

Solutions for the Internet of Things
eBook Download: EPUB
2016
John Wiley & Sons (Verlag)
978-1-119-08441-9 (ISBN)

Lese- und Medienproben

Wireless Communications Security - Jyrki T. J. Penttinen
Systemvoraussetzungen
91,99 inkl. MwSt
(CHF 89,85)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

The development of the wireless communications environment, especially as related to security, has been relatively stable compared to the issues of fixed Internet. Nevertheless, along with the enhanced functionalities of smart devices, networks and applications, the level of malicious attacks has increased considerably. It can be estimated that security attacks, distribution of viruses and other malicious activities increase in the wireless environment along with the higher number of users. Not only are payment activities, person-to-person communications and social media utilization under constant threat, but furthermore, one of the strongly increasing security risks is related to M2M (Machine-to-Machine) communications.  This book describes the current and most probable future wireless security solutions. The focus is on the technical discussion of existing systems and new trends like Internet of Things (IoT). It also discusses existing and potential security threats, presents methods for protecting systems, operators and end-users, describes security systems attack types and the new dangers in the ever-evolving Internet. The book functions as a practical guide describing the evolvement of the wireless environment, and how to ensure the fluent continuum of the new functionalities, whilst minimizing the potential risks in network security.

 


This book describes the current and most probable future wireless security solutions. The focus is on the technical discussion of existing systems and new trends like Internet of Things (IoT). It also discusses existing and potential security threats, presents methods for protecting systems, operators and end-users, describes security systems attack types and the new dangers in the ever-evolving Internet. The book functions as a practical guide describing the evolvement of the wireless environment, and how to ensure the fluent continuum of the new functionalities, whilst minimizing the potential risks in network security.

Jyrki Penttinen has worked in mobile telecommunications with network operators and manufacturers since 1994. He has theoretical knowledge and operational experience of end-to-end architectures and functioning of major mobile communications systems, including GSM/GPRS/EDGE, UMTS/HSPA and LTE/LTE-A with their respective evolution paths. He has worked in research and operational activities in both radio and core network domains, including planning, optimization, measurements, system architectures and services. He joined Giesecke & Devrient Mobile Security team in 2014, currently focusing on the security solutions and future trends of the industry.

Abbreviations


3DES
Triple‐Data Encryption Standard
3GPP
3rd Generation Partnership Program
6LoWPAN
IPv6 Low power Wireless Personal Area Network
AAA
Authentication, Authorization and Accounting
AAS
Active Antenna System
ACP
Access Control Policy
ADF
Application Dedicated File
ADMF
Administration Function
ADSL
Asymmetric Digital Subscriber Line
ADT
Android Developer Tool
AES
Advanced Encryption Standard
AF
Authentication Framework
AID
Application ID
AIDC
Automatic Identification and Data Capture
AIE
Air Interface Encryption
AK
Anonymity Key
AKA
Authentication and Key Agreement
ALC
Asynchronous Layered Coding
AMF
Authenticated Management Field
AMI
Advanced Metering Infrastructure
AMPS
Advanced Mobile Phone System
ANDSF
Access Network Discovery and Selection Function
ANSI
American National Standards Institute
AOTA
Advanced Over‐the‐Air
AP
Access Point
AP
Application Provider
APDU
Application Protocol Data Unit
API
Application Programming Interface
AR
Aggregation Router
ARIB
Association of Radio Industries and Businesses
AS
Access Stratum
AS
Authentication Server
ASIC
Application‐Specific Integrated Circuit
ASME
Access Security Management Entity
ASN.1
Abstract Syntax Notation One
ATCA
Advanced Telecommunications Computing Architecture
ATR
Answer to Reset
ATSC
Advanced Television Systems Committee
AuC
Authentication Centre
AUTN
Authentication Token
AV
Authentication Vector
AVD
Android Virtual Device
BAN
Business/Building Area Network
BCBP
Bar Coded Boarding Pass
BCCH
Broadcast Control Channel
BE
Backend
BGA
Ball Grid Array
BIN
Bank Identification Number
BIP
Bearer‐Independent Protocol
BLE
Bluetooth, Low‐Energy
BM‐SC
Broadcast – Multicast Service Centre
BSC
Base Station Controller
BSP
Biometric Service Provider
BSS
Billing System
BSS
Business Support System
BTS
Base Transceiver Station
C2
Command and Control
CA
Conditional Access
CA
Carrier Aggregation
CA
Certificate Authority
CA
Controlling Authority
CAT
Card Application Toolkit
CAT_TP
Card Application Toolkit Transport Protocol
CAVE
Cellular Authentication and Voice Encryption
CB
Cell Broadcast
CBEFF
Common Biometric Exchange Formats Framework
CC
Common Criteria
CC
Congestion Control
CCM
Card Content Management
CCMP
Counter‐mode Cipher block chaining Message authentication code Protocol
CCSA
China Communications Standards Association
CDMA
Code Division Multiple Access
CEIR
Central EIR
CEPT
European Conference of Postal and Telecommunications Administrations
CFN
Connection Frame Number
CGN
Carrier‐Grade NAT
CHV
Chip Holder Verification
CI
Certificate Issuer
CK
Cipher Key
CL
Contactless
CLA
Class of Instruction
CLF
Contactless Frontend
CLK
Clock
CMAS
Commercial Mobile Alert System
CMP
Certificate Management Protocol
CN
Core Network
CoAP
Constrained Application Protocol
CoC
Content of Communication
CPU
Central Processing Unit
CS
Circuit Switched
CSFB
Circuit Switched Fallback
CSG
Closed Subscriber Group
CSS7
Common Signaling System
CVM
Cardholder Verification Method
DBF
Database File
DD
Digital Dividend
DDoS
Distributed Denial‐of‐Service
DE
Data Element
DES
Data Encryption Standard
DF
Dedicated File
DFN
Dual‐Flat, No leads
DHCP
Dynamic Host Configuration Protocol
DL
Downlink
DM
Device Management
DM
Device Manufacturer
DMO
Direct Mode Operation
DNS
Domain Name System
DoS
Denial‐of‐Service
DPA
Data Protection Act
DPI
Deep Packet Inspection
DRM
Digital Rights Management
DS
Data Synchronization
DSS
Data Security Standard
DSSS
Direct Sequence Spread Spectrum
DTLS
Datagram Transport Layer Security
DTMB
Digital Terrestrial Multimedia Broadcast
DVB
Digital Video Broadcasting
EAL
Evaluation Assurance Level
EAN
Extended Area Network
EAP
Extensible Authentication Protocol
EAPoL
Extensible Authentication Protocol over Local Area Network
EAP‐TTLS
Extensible Authentication Protocol‐Tunneled Transport Layer Security
ECASD
eUICC Controlling Authority Secure Domain
eCAT
Encapsulated Card Application Toolkit
ECC
Elliptic Curve Cryptography
ECDSA
Elliptic Curve Digital Signature Algorithm
ECO
European Communications Office
EDGE
Enhanced Data Rates for Global Evolution
EEM
Ethernet Emulation Mode
EEPROM
Electrically Erasable Read‐Only Memory
EF
Elementary File
EGAN
Enhanced Generic Access Network
EID
eUICC Identifier
EIR
Equipment Identity Register
E‐MBS
Enhanced Multicast Broadcast Service
EMC
Electro‐Magnetic Compatibility
EMF
Electro‐Magnetic Field
EMI
Electro‐Magnetic Interference
EMM
EPS Mobility Management
EMP
Electro‐Magnetic Pulse
eNB
Evolved Node B
EPC
Enhanced Packet Core
EPC
Evolved Packet Core
EPS
Electric Power System
EPS
Enhanced Packet System
ERP
Enterprise Resource Planning
ERTMS
European Rail Traffic Management System
eSE
Embedded Security Element
eSIM
Embedded Subscriber Identity Module
ESN
Electronic Serial Number
ESP
Encapsulating Security Payload
ETSI
European Telecommunications Standards Institute
ETWS
Earthquake and Tsunami Warning System
eUICC
Embedded Universal Integrated Circuit Card
EUM
eUICC Manufacturer
E‐UTRAN
Enhanced UTRAN
EV‐DO
Evolution Data Only/Data Optimized
FAC
Final Approval Code
FAN
Field Area Network
FCC
Federal Communications Commission
FDD
Frequency Division Multiplex
FDT
File Delivery Table
FEC
Forward Error Correction
FF
Form Factor
FICORA
Finnish Communications Regulatory Authority
FID
File‐ID
FIPS
Federal Information Processing Standards
FLUTE
File Transport over Unidirectional Transport
FM
Frequency Modulation
FPGA
Field Programmable Gate Array
GAA
Generic Authentication Architecture
GBA
Generic Bootstrapping Architecture
GCSE
Group Communication System Enabler
GEA
GPRS Encryption Algorithm
GERAN
GSM EDGE Radio Access Network
GGSN
Gateway GPRS Support Node
GMSK
Gaussian Minimum Shift Keying
GoS
Grade of Service
GP
GlobalPlatform
GPRS
General Packet Radio Service
GPS
Global Positioning System
GRX
GPRS Roaming Exchange
GSM
Global System for Mobile Communications
GSMA
GSM Association
GTP
GPRS Tunnelling Protocol
GUI
Graphical User Interface
HAN
Home Area Network
HCE
Host Card...

Erscheint lt. Verlag 14.9.2016
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Communication System Security • Communication Technology - Networks • Drahtlose Kommunikation • Electrical & Electronics Engineering • Elektrotechnik u. Elektronik • Internet of Things (IoT) • Internet Security • Kommunikationsnetz • Kommunikationsnetze • malware threats • Mobile & Wireless Communications • Sicherheit • Sicherheit in Kommunikationssystemen • Social Media Security • wireless networks • Wireless Security
ISBN-10 1-119-08441-5 / 1119084415
ISBN-13 978-1-119-08441-9 / 9781119084419
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
EPUBEPUB (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Technische und organisatorische Schutzmaßnahmen gegen Datenverlust …

von Thomas H. Lenhard

eBook Download (2025)
Springer Vieweg (Verlag)
CHF 34,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 45,90
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 38,95