Wireless Communications Security (eBook)
John Wiley & Sons (Verlag)
978-1-119-08441-9 (ISBN)
The development of the wireless communications environment, especially as related to security, has been relatively stable compared to the issues of fixed Internet. Nevertheless, along with the enhanced functionalities of smart devices, networks and applications, the level of malicious attacks has increased considerably. It can be estimated that security attacks, distribution of viruses and other malicious activities increase in the wireless environment along with the higher number of users. Not only are payment activities, person-to-person communications and social media utilization under constant threat, but furthermore, one of the strongly increasing security risks is related to M2M (Machine-to-Machine) communications. This book describes the current and most probable future wireless security solutions. The focus is on the technical discussion of existing systems and new trends like Internet of Things (IoT). It also discusses existing and potential security threats, presents methods for protecting systems, operators and end-users, describes security systems attack types and the new dangers in the ever-evolving Internet. The book functions as a practical guide describing the evolvement of the wireless environment, and how to ensure the fluent continuum of the new functionalities, whilst minimizing the potential risks in network security.
This book describes the current and most probable future wireless security solutions. The focus is on the technical discussion of existing systems and new trends like Internet of Things (IoT). It also discusses existing and potential security threats, presents methods for protecting systems, operators and end-users, describes security systems attack types and the new dangers in the ever-evolving Internet. The book functions as a practical guide describing the evolvement of the wireless environment, and how to ensure the fluent continuum of the new functionalities, whilst minimizing the potential risks in network security.
Jyrki Penttinen has worked in mobile telecommunications with network operators and manufacturers since 1994. He has theoretical knowledge and operational experience of end-to-end architectures and functioning of major mobile communications systems, including GSM/GPRS/EDGE, UMTS/HSPA and LTE/LTE-A with their respective evolution paths. He has worked in research and operational activities in both radio and core network domains, including planning, optimization, measurements, system architectures and services. He joined Giesecke & Devrient Mobile Security team in 2014, currently focusing on the security solutions and future trends of the industry.
Abbreviations
- 3DES
- Triple‐Data Encryption Standard
- 3GPP
- 3rd Generation Partnership Program
- 6LoWPAN
- IPv6 Low power Wireless Personal Area Network
- AAA
- Authentication, Authorization and Accounting
- AAS
- Active Antenna System
- ACP
- Access Control Policy
- ADF
- Application Dedicated File
- ADMF
- Administration Function
- ADSL
- Asymmetric Digital Subscriber Line
- ADT
- Android Developer Tool
- AES
- Advanced Encryption Standard
- AF
- Authentication Framework
- AID
- Application ID
- AIDC
- Automatic Identification and Data Capture
- AIE
- Air Interface Encryption
- AK
- Anonymity Key
- AKA
- Authentication and Key Agreement
- ALC
- Asynchronous Layered Coding
- AMF
- Authenticated Management Field
- AMI
- Advanced Metering Infrastructure
- AMPS
- Advanced Mobile Phone System
- ANDSF
- Access Network Discovery and Selection Function
- ANSI
- American National Standards Institute
- AOTA
- Advanced Over‐the‐Air
- AP
- Access Point
- AP
- Application Provider
- APDU
- Application Protocol Data Unit
- API
- Application Programming Interface
- AR
- Aggregation Router
- ARIB
- Association of Radio Industries and Businesses
- AS
- Access Stratum
- AS
- Authentication Server
- ASIC
- Application‐Specific Integrated Circuit
- ASME
- Access Security Management Entity
- ASN.1
- Abstract Syntax Notation One
- ATCA
- Advanced Telecommunications Computing Architecture
- ATR
- Answer to Reset
- ATSC
- Advanced Television Systems Committee
- AuC
- Authentication Centre
- AUTN
- Authentication Token
- AV
- Authentication Vector
- AVD
- Android Virtual Device
- BAN
- Business/Building Area Network
- BCBP
- Bar Coded Boarding Pass
- BCCH
- Broadcast Control Channel
- BE
- Backend
- BGA
- Ball Grid Array
- BIN
- Bank Identification Number
- BIP
- Bearer‐Independent Protocol
- BLE
- Bluetooth, Low‐Energy
- BM‐SC
- Broadcast – Multicast Service Centre
- BSC
- Base Station Controller
- BSP
- Biometric Service Provider
- BSS
- Billing System
- BSS
- Business Support System
- BTS
- Base Transceiver Station
- C2
- Command and Control
- CA
- Conditional Access
- CA
- Carrier Aggregation
- CA
- Certificate Authority
- CA
- Controlling Authority
- CAT
- Card Application Toolkit
- CAT_TP
- Card Application Toolkit Transport Protocol
- CAVE
- Cellular Authentication and Voice Encryption
- CB
- Cell Broadcast
- CBEFF
- Common Biometric Exchange Formats Framework
- CC
- Common Criteria
- CC
- Congestion Control
- CCM
- Card Content Management
- CCMP
- Counter‐mode Cipher block chaining Message authentication code Protocol
- CCSA
- China Communications Standards Association
- CDMA
- Code Division Multiple Access
- CEIR
- Central EIR
- CEPT
- European Conference of Postal and Telecommunications Administrations
- CFN
- Connection Frame Number
- CGN
- Carrier‐Grade NAT
- CHV
- Chip Holder Verification
- CI
- Certificate Issuer
- CK
- Cipher Key
- CL
- Contactless
- CLA
- Class of Instruction
- CLF
- Contactless Frontend
- CLK
- Clock
- CMAS
- Commercial Mobile Alert System
- CMP
- Certificate Management Protocol
- CN
- Core Network
- CoAP
- Constrained Application Protocol
- CoC
- Content of Communication
- CPU
- Central Processing Unit
- CS
- Circuit Switched
- CSFB
- Circuit Switched Fallback
- CSG
- Closed Subscriber Group
- CSS7
- Common Signaling System
- CVM
- Cardholder Verification Method
- DBF
- Database File
- DD
- Digital Dividend
- DDoS
- Distributed Denial‐of‐Service
- DE
- Data Element
- DES
- Data Encryption Standard
- DF
- Dedicated File
- DFN
- Dual‐Flat, No leads
- DHCP
- Dynamic Host Configuration Protocol
- DL
- Downlink
- DM
- Device Management
- DM
- Device Manufacturer
- DMO
- Direct Mode Operation
- DNS
- Domain Name System
- DoS
- Denial‐of‐Service
- DPA
- Data Protection Act
- DPI
- Deep Packet Inspection
- DRM
- Digital Rights Management
- DS
- Data Synchronization
- DSS
- Data Security Standard
- DSSS
- Direct Sequence Spread Spectrum
- DTLS
- Datagram Transport Layer Security
- DTMB
- Digital Terrestrial Multimedia Broadcast
- DVB
- Digital Video Broadcasting
- EAL
- Evaluation Assurance Level
- EAN
- Extended Area Network
- EAP
- Extensible Authentication Protocol
- EAPoL
- Extensible Authentication Protocol over Local Area Network
- EAP‐TTLS
- Extensible Authentication Protocol‐Tunneled Transport Layer Security
- ECASD
- eUICC Controlling Authority Secure Domain
- eCAT
- Encapsulated Card Application Toolkit
- ECC
- Elliptic Curve Cryptography
- ECDSA
- Elliptic Curve Digital Signature Algorithm
- ECO
- European Communications Office
- EDGE
- Enhanced Data Rates for Global Evolution
- EEM
- Ethernet Emulation Mode
- EEPROM
- Electrically Erasable Read‐Only Memory
- EF
- Elementary File
- EGAN
- Enhanced Generic Access Network
- EID
- eUICC Identifier
- EIR
- Equipment Identity Register
- E‐MBS
- Enhanced Multicast Broadcast Service
- EMC
- Electro‐Magnetic Compatibility
- EMF
- Electro‐Magnetic Field
- EMI
- Electro‐Magnetic Interference
- EMM
- EPS Mobility Management
- EMP
- Electro‐Magnetic Pulse
- eNB
- Evolved Node B
- EPC
- Enhanced Packet Core
- EPC
- Evolved Packet Core
- EPS
- Electric Power System
- EPS
- Enhanced Packet System
- ERP
- Enterprise Resource Planning
- ERTMS
- European Rail Traffic Management System
- eSE
- Embedded Security Element
- eSIM
- Embedded Subscriber Identity Module
- ESN
- Electronic Serial Number
- ESP
- Encapsulating Security Payload
- ETSI
- European Telecommunications Standards Institute
- ETWS
- Earthquake and Tsunami Warning System
- eUICC
- Embedded Universal Integrated Circuit Card
- EUM
- eUICC Manufacturer
- E‐UTRAN
- Enhanced UTRAN
- EV‐DO
- Evolution Data Only/Data Optimized
- FAC
- Final Approval Code
- FAN
- Field Area Network
- FCC
- Federal Communications Commission
- FDD
- Frequency Division Multiplex
- FDT
- File Delivery Table
- FEC
- Forward Error Correction
- FF
- Form Factor
- FICORA
- Finnish Communications Regulatory Authority
- FID
- File‐ID
- FIPS
- Federal Information Processing Standards
- FLUTE
- File Transport over Unidirectional Transport
- FM
- Frequency Modulation
- FPGA
- Field Programmable Gate Array
- GAA
- Generic Authentication Architecture
- GBA
- Generic Bootstrapping Architecture
- GCSE
- Group Communication System Enabler
- GEA
- GPRS Encryption Algorithm
- GERAN
- GSM EDGE Radio Access Network
- GGSN
- Gateway GPRS Support Node
- GMSK
- Gaussian Minimum Shift Keying
- GoS
- Grade of Service
- GP
- GlobalPlatform
- GPRS
- General Packet Radio Service
- GPS
- Global Positioning System
- GRX
- GPRS Roaming Exchange
- GSM
- Global System for Mobile Communications
- GSMA
- GSM Association
- GTP
- GPRS Tunnelling Protocol
- GUI
- Graphical User Interface
- HAN
- Home Area Network
- HCE
- Host Card...
| Erscheint lt. Verlag | 14.9.2016 |
|---|---|
| Sprache | englisch |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Technik ► Elektrotechnik / Energietechnik | |
| Technik ► Nachrichtentechnik | |
| Schlagworte | Communication System Security • Communication Technology - Networks • Drahtlose Kommunikation • Electrical & Electronics Engineering • Elektrotechnik u. Elektronik • Internet of Things (IoT) • Internet Security • Kommunikationsnetz • Kommunikationsnetze • malware threats • Mobile & Wireless Communications • Sicherheit • Sicherheit in Kommunikationssystemen • Social Media Security • wireless networks • Wireless Security |
| ISBN-10 | 1-119-08441-5 / 1119084415 |
| ISBN-13 | 978-1-119-08441-9 / 9781119084419 |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belletristik und Sachbüchern. Der Fließtext wird dynamisch an die Display- und Schriftgröße angepasst. Auch für mobile Lesegeräte ist EPUB daher gut geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich