Mobile Communication Systems and Security

by
Format: eBook
Pub. Date: 2009-07-01
Publisher(s): Wiley-IEEE Press
Availability: This title is currently not available.
List Price: $145.00

Rent Textbook

Select for Price
There was a problem. Please try again later.

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

Summary

Mobile Communication Systems and Security arms readers with a thorough understanding of all major cellular air-interface technologies and their security layer techniques. Rhee covers the technological development of wireless mobile communications in compliance with each iterative generation up to 3G systems and beyond, with an emphasis on wireless security aspects. By progressing in a systematic manner, presenting the theory and practice of wireless mobile technologies along with various security problems, readers will gain an intimate sense of how mobile systems operate and how to address complex security issues. Written by a top expert in information security Details each generation of cellular technology Gives a clear understanding of wireless security protocol analysis Offers complete coverage of various protocols and specifications in 3GPPs Forecasts new features and promising technologies Presents numerical examples in each chapter for easier understanding Provides source code that can be used for individual practice The book is ideal for advanced undergraduate and postgraduate students enrolled in courses such as Wireless Networking, Wireless Security, or Mobile Radio Communications. Practicing engineers in industry and research scientists can use the book as a reference to get reacquainted with mobile radio fundamentals or to gain deeper understanding of the security layer. Access the source code and lecture materials at the companion website: (www.wiley.com/go/rhee )

Table of Contents

Preface
Acknowledgement
About the Author
Abbreviations
Global System for Mobile Communications
GSM Bandwidth Allocation
GSM System Architecture
GSM Transmission Network Architecture
Signaling Channels on the Air Interface
GSM Security Architecture
cdmaOne IS-95A Technology
Reverse CDMA Channel
Forward CDMA Channel
General Packet Radio Service (GPRS)
GPRS System Architecture
GPRS Logical Functions
Layered Protocol Architecture of Transmission Plane
GPRS Ciphering Algorithm
Third-generation Partnership Projects (3GPP and 3GPP2)
3G Partnership Projects
Evolution of Mobile Radio Technologies
Cryptographic Protocols Applicable to Wireless Security Technologies
Universal Mobile Telecommunication System (UMTS)
UMTS Standardization
FDD/TDD Modes for UTRA Operation
UMTS Architecture
UTRAN Architecture
UTRAN Terrestrial Interface
UTRAN-CN Interface via Iu
UMTS Security Related Features
UTRAN Overall Functions
UTRAN Iub Interface Protocol Structure
UTRAN Iur Interface Protocol Structure
High Speed Downlink Packet Access (HSDPA)
Basic Structure of HS-DSCH
Overview of HSDPA Enhancement Technologies
HS-DSCH MAC Architecture-UE Side
HS-DSCH MAC Architecture-UTRAN Side
Overview of HSDPA Techniques to Support UTRA
Orthogonal Frequency Division Multiplexing (OFDM)
Prospect of OFDM-based Applications
CDMA2000 1x High Rate Packet Data System (1xEV-DO)
Architectural Reference Protocol Model
Air Interface Layering Protocol
Stream Layer Protocol
Session Layer Protocol
Connection Layer Protocol
Security Layer Protocols
MAC Layer Protocols
Physical Layer Protocol
CDMA2000 1x Evolution-Data and Voice (1xEV-DV)
UMTS (WCDMA) Versus CDMA2000-Physical Layer Harmonization
Reverse CDMA Channel
Forward CDMA Channel
CDMA2000 Entities and Service Interfaces
Advanced Encryption Standard and Elliptic Curve Cryptosystems
Advanced Encryption Standard (AES)
Elliptic Curve Cryptosystem (ECC)
Elliptic Curve Cryptosystem versus Public-Key Cryptosystems
Hash Function, Message Authentication Code, and Data Expansion Function
MD5 Message-Digest Algorithm
Secure Hash Algorithm (SHA-1)
Hashed Message Authentication Codes (HMAC)
Data Expansion Function
Bibliography
Index
Table of Contents provided by Publisher. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.