Mobile Communication Systems and Security

by
Format: Hardcover
Pub. Date: 2009-04-06
Publisher(s): Wiley-IEEE Press
List Price: $176.75

Rent Textbook

Select for Price
There was a problem. Please try again later.

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Arms readers with a well-rounded understanding of all major cellular air-interface technologies and their security layer techniquesMobile Radio Communications and Wireless Security covers technological development of wireless mobile communications in compliance with each iterative generation over the past decade. It presents the evolution and migration starting from 2G mobile radio technologies to 3G and beyond systems, largely covering packet-switched voice and data communications, with an emphasis on security layer protocols. Topics include GSM and cdmaOne IS-95A (2G), GPRS (2.5G), UMTS along with WCDMA (3G), CDMA2000 1xEV-DO (3G), CDMA2000 1xEV-DV (3G), HSDPA (3.5G), OFDM Radio Access technology (3.5G), AES and Elliptic Curve Cryptograph, Hash Function and Message Digest, HMAC, Data Expansion Technique by P-hash (secret, seed), Pseudo-random Function for Key generation. Delves into each iterative generation of cellular technology Provides an intimate understanding of security protocol layer techniques Written by a top expert in information security Presents numerical examples in each chapter for easier understanding Comes with code that can be used for individual practice Lecture notes available for instructor use

Author Biography

ManYoung Rhee is an Endowed Chair Professor atKyung Hee University and has over 45 years of research and teaching experience in the field of communication technologies, coding theory, cryptography, and information security. His career in academia includes professorships at Hanyang University (he also held the position of Vice President at this university), Virginia Tech, Seoul National University, and the University of Tokyo. Dr Rhee has held a number of high level positions in both government and corporate sectors: President of Samsung Semiconductor Communications; President of Korea Telecommunications Company; Chairman of the Korea Information Security Agency at the Ministry of Information and Communication; President of the Korea Institute of Information Security and Cryptology; and Vice President of the Agency for Defense Development at the Ministry of National Defense. He is a Member of the National Academy of Sciences, Senior Fellowat theKorea Academy of Science and Technology, and an Honorary Member of the National Academy of Engineering of Korea. His awards include the ‘‘Dongbaek’’ Order of National Service Merit and the "Mugunghwa" Order of National Service Merit, the highest grade honor for a scientist inKorea,NASPrize, the National Academy of Sciences, NAEK Grand Prize, the National Academy of Engineering of Korea, and Information Security Grand Prize, KIISC. He has also published the following four books: Coding, Cryptography, and Mobile Communications: Internet Security, John Wiley, 2003; CDMA Cellular Mobile Communications and Network Security, Prentice Hall, 1998; Cryptography and Secure Communications, McGraw-Hill, 1994; and Error Correcting Coding Theory, McGraw-Hill, 1989. Dr Rhee has a B.S. in Electrical Engineering from Seoul National University, and an M.S. in Electrical Engineering and a Ph.D. from the University of Colorado.

Table of Contents

Global System for Mobile Communications
GSM Bandwidth Allocation
GSM System Architecture
GSM Transmission Network Architecture
Signalling Channels on the Air Interface
GSM Security Architecture
cdma One IS-95A Technology
Reverse CDMA Channel
Reverse Traffic Channel
Access Channel
Multiplex Option 1 Information
Multiplex Option 2 Information
Forward CDMA Channel
Pilot Channel
Sync Channel
Paging Channel
Forward Traffic Channel
General Packet Radio Service (GPRS)
GPRS System Architecture
GPRS Logical Functions
Layered Protocol Architecture of Transmission Plane
GPRS Ciphering Algorithm
Third Generation Partnership Projects
3G Partnership Projects
Evolution of Mobile Radio Technologies
Cryptographic Protocols Applicable to Wireless Security Technologies
Universal Mobile Telecommunication System
UMTS Standardization
FDD/TDD modes for UTRA Operation
UMTS Architecture
UTRAN Architecture
UTRAN Terrestrial Interface
UTRAN-CN Interface via Iu
UMTS Security Related Features
UTRAN Overall Functions
UTRAN Iub Interface Protocol Structure
High Speed Downlink Packet Access (HSDPA)
Basic Structure of HS-DSCH
Overview of HSDPA Enhancement Technologies
HS-DSCH MAC Architecture - UE side
HS-DSCH MAC Architecture-UTRAN side
Overview of HSDPA Techniques to Support UTRA
Orthogonal Frequency Division Multiplexing (OFDM)
Prospect of OFDM-based Applications
CDMA 2000 1x High Rate Packet Data System (1xEV-DO)
Architectural Reference Protocol Model
Air Interface Layering Protocol
Stream Layer Protocol
Session Layer Protocol
Connection Layer Protocol
Security Layer Protocols
MAC Layer Protocols
Physical Layer Protocol
CDMA2000 1x Evolution-Data and Voice (1x EV-DV)
UMTS (WCDMA) versus CDMA2000 - Physical Layer Harmonization
Reverse CDMA Channel
Forward CDMA Channel
CDMA 2000 Entities and Service Interfaces
Advanced Encryption Standard and Elliptic Curve Cryptosystems
Advanced Encryption Standard (AES)
Elliptic Curve Cryptosystem (ECC)
Elliptic Curve Cryptosystem versus Public-key Cryptosystems
Hash Function, Message Authentication Code and Data Expansion Function
MD5 Message-Digest Algorithm
Secure Hash Algorithm (SHA-1)
Hashed Message Authentication Codes (HMAC)
Data Expansion Function
Table of Contents provided by Publisher. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.