BN.com Gift Guide

Mobile Communication Systems and Security / Edition 1

Hardcover (Print)
Buy New
Buy New from BN.com
$126.06
Used and New from Other Sellers
Used and New from Other Sellers
from $93.53
Usually ships in 1-2 business days
(Save 41%)
Other sellers (Hardcover)
  • All (5) from $93.53   
  • New (4) from $93.53   
  • Used (1) from $126.05   

Overview

Mobile Communication Systems and Security arms readers with a thorough understanding of all major cellular air-interface technologies and their security layer techniques. Rhee covers the technological development of wireless mobile communications in compliance with each iterative generation up to 3G systems and beyond, with an emphasis on wireless security aspects. By progressing in a systematic manner, presenting the theory and practice of wireless mobile technologies along with various security problems, readers will gain an intimate sense of how mobile systems operate and how to address complex security issues.

  • Written by a top expert in information security
  • Details each generation of cellular technology
  • Gives a clear understanding of wireless security protocol analysis
  • Offers complete coverage of various protocols and specifications in 3GPPs
  • Forecasts new features and promising technologies
  • Presents numerical examples in each chapter for easier understanding
  • Provides source code that can be used for individual practice

The book is ideal for advanced undergraduate and postgraduate students enrolled in courses such as Wireless Networking, Wireless Security, or Mobile Radio Communications. Practicing engineers in industry and research scientists can use the book as a reference to get reacquainted with mobile radio fundamentals or to gain deeper understanding of the security layer.

Access the source code and lecture materials at the companion website: (www.wiley.com/go/rhee)

Read More Show Less

Product Details

  • ISBN-13: 9780470823361
  • Publisher: Wiley
  • Publication date: 4/6/2009
  • Edition number: 1
  • Pages: 448
  • Product dimensions: 6.70 (w) x 9.90 (h) x 1.20 (d)

Meet the Author

ManYoung Rhee is an Endowed Chair Professor atKyung Hee University and has over 45 years of research and teaching experience in the field of communication technologies, coding theory, cryptography, and information security. His career in academia includes professorships at Hanyang University (he also held the position of Vice President at this university), Virginia Tech, Seoul National University, and the University of Tokyo. Dr Rhee has held a number of high level positions in both government and corporate sectors: President of Samsung Semiconductor Communications; President of Korea Telecommunications Company; Chairman of the Korea Information Security Agency at the Ministry of Information and Communication; President of the Korea Institute of Information Security and Cryptology; and Vice President of the Agency for Defense Development at the Ministry of National Defense. He is a Member of the National Academy of Sciences, Senior Fellowat theKorea Academy of Science and Technology, and an Honorary Member of the National Academy of Engineering of Korea. His awards include the ‘‘Dongbaek’’ Order of National Service Merit and the "Mugunghwa" Order of National Service Merit, the highest grade honor for a scientist inKorea,NASPrize, the National Academy of Sciences, NAEK Grand Prize, the National Academy of Engineering of Korea, and Information Security Grand Prize, KIISC. He has also published the following four books: Coding, Cryptography, and Mobile Communications: Internet Security, John Wiley, 2003; CDMA Cellular Mobile Communications and Network Security, Prentice Hall, 1998; Cryptography and Secure Communications, McGraw-Hill, 1994; and Error Correcting Coding Theory, McGraw-Hill, 1989. Dr Rhee has a B.S. in Electrical Engineering from Seoul National University, and an M.S. in Electrical Engineering and a Ph.D. from the University of Colorado.

Read More Show Less

Table of Contents

Preface.

Acknowledgement.

About the Author.

Abbreviations.

1 Global System for Mobile Communications.

1.1 GSM Bandwidth Allocation.

1.2 GSM System Architecture.

1.3 GSM Transmission Network Architecture.

1.4 Signaling Channels on the Air Interface.

1.5 GSM Security Architecture.

2 cdmaOne IS-95A Technology.

2.1 Reverse CDMA Channel.

2.2 Forward CDMA Channel.

3 General Packet Radio Service (GPRS).

3.1 GPRS System Architecture.

3.2 GPRS Logical Functions.

3.3 Layered Protocol Architecture of Transmission Plane.

3.4 GPRS Ciphering Algorithm.

4 Third-generation Partnership Projects (3GPP and 3GPP2).

4.1 3G Partnership Projects.

4.2 Evolution of Mobile Radio Technologies.

4.3 Cryptographic Protocols Applicable to Wireless Security Technologies.

5 Universal Mobile Telecommunication System (UMTS).

5.1 UMTS Standardization.

5.2 FDD/TDD Modes for UTRA Operation.

5.3 UMTS Architecture.

5.4 UTRAN Architecture.

5.5 UTRAN Terrestrial Interface.

5.6 UTRAN-CN Interface via Iu.

5.7 UMTS Security Related Features.

5.8 UTRAN Overall Functions.

5.9 UTRAN Iub Interface Protocol Structure.

5.10 UTRAN Iur Interface Protocol Structure.

6 High Speed Downlink Packet Access (HSDPA).

6.1 Basic Structure of HS-DSCH.

6.2 Overview of HSDPA Enhancement Technologies.

6.3 HS-DSCH MAC Architecture—UE Side.

6.4 HS-DSCH MAC Architecture—UTRAN Side.

6.5 Overview of HSDPA Techniques to Support UTRA.

6.6 Orthogonal Frequency Division Multiplexing (OFDM).

6.7 Prospect of OFDM-based Applications.

7 CDMA2000 1x High Rate Packet Data System (1xEV-DO).

7.1 Architectural Reference Protocol Model.

7.2 Air Interface Layering Protocol.

7.3 Stream Layer Protocol.

7.4 Session Layer Protocol.

7.5 Connection Layer Protocol.

7.6 Security Layer Protocols.

7.7 MAC Layer Protocols.

7.8 Physical Layer Protocol.

8 CDMA2000 1x Evolution-Data and Voice (1xEV-DV).

8.1 UMTS (WCDMA) Versus CDMA2000—Physical Layer Harmonization.

8.2 Reverse CDMA Channel.

8.3 Forward CDMA Channel.

8.4 CDMA2000 Entities and Service Interfaces.

9 Advanced Encryption Standard and Elliptic Curve Cryptosystems.

9.1 Advanced Encryption Standard (AES).

9.2 Elliptic Curve Cryptosystem (ECC).

9.3 Elliptic Curve Cryptosystem versus Public-Key Cryptosystems.

10 Hash Function, Message Authentication Code, and Data Expansion Function.

10.1 MD5 Message-Digest Algorithm.

10.2 Secure Hash Algorithm (SHA-1).

10.3 Hashed Message Authentication Codes (HMAC).

10.4 Data Expansion Function.

Bibliography.

Index.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)