Mobile Communication Systems and Security / Edition 1by Man Young Rhee
Pub. Date: 04/06/2009
Mobile Communication Systems and Security arms readers with a thorough understanding of all major cellular air-interface technologies and their security layer techniques. Rhee covers the technological development of wireless mobile communications in compliance with each iterative generation up to 3G systems and beyond, with an emphasis on wireless security/i>
Mobile Communication Systems and Security arms readers with a thorough understanding of all major cellular air-interface technologies and their security layer techniques. Rhee covers the technological development of wireless mobile communications in compliance with each iterative generation up to 3G systems and beyond, with an emphasis on wireless security aspects. By progressing in a systematic manner, presenting the theory and practice of wireless mobile technologies along with various security problems, readers will gain an intimate sense of how mobile systems operate and how to address complex security issues.
- Written by a top expert in information security
- Details each generation of cellular technology
- Gives a clear understanding of wireless security protocol analysis
- Offers complete coverage of various protocols and specifications in 3GPPs
- Forecasts new features and promising technologies
- Presents numerical examples in each chapter for easier understanding
- Provides source code that can be used for individual practice
The book is ideal for advanced undergraduate and postgraduate students enrolled in courses such as Wireless Networking, Wireless Security, or Mobile Radio Communications. Practicing engineers in industry and research scientists can use the book as a reference to get reacquainted with mobile radio fundamentals or to gain deeper understanding of the security layer.
Access the source code and lecture materials at the companion website: (www.wiley.com/go/rhee)
- Publication date:
- Product dimensions:
- 6.70(w) x 9.90(h) x 1.20(d)
Table of Contents
About the Author.
1 Global System for Mobile Communications.
1.1 GSM Bandwidth Allocation.
1.2 GSM System Architecture.
1.3 GSM Transmission Network Architecture.
1.4 Signaling Channels on the Air Interface.
1.5 GSM Security Architecture.
2 cdmaOne IS-95A Technology.
2.1 Reverse CDMA Channel.
2.2 Forward CDMA Channel.
3 General Packet Radio Service (GPRS).
3.1 GPRS System Architecture.
3.2 GPRS Logical Functions.
3.3 Layered Protocol Architecture of Transmission Plane.
3.4 GPRS Ciphering Algorithm.
4 Third-generation Partnership Projects (3GPP and 3GPP2).
4.1 3G Partnership Projects.
4.2 Evolution of Mobile Radio Technologies.
4.3 Cryptographic Protocols Applicable to Wireless Security Technologies.
5 Universal Mobile Telecommunication System (UMTS).
5.1 UMTS Standardization.
5.2 FDD/TDD Modes for UTRA Operation.
5.3 UMTS Architecture.
5.4 UTRAN Architecture.
5.5 UTRAN Terrestrial Interface.
5.6 UTRAN-CN Interface via Iu.
5.7 UMTS Security Related Features.
5.8 UTRAN Overall Functions.
5.9 UTRAN Iub Interface Protocol Structure.
5.10 UTRAN Iur Interface Protocol Structure.
6 High Speed Downlink Packet Access (HSDPA).
6.1 Basic Structure of HS-DSCH.
6.2 Overview of HSDPA Enhancement Technologies.
6.3 HS-DSCH MAC Architecture—UE Side.
6.4 HS-DSCH MAC Architecture—UTRAN Side.
6.5 Overview of HSDPA Techniques to Support UTRA.
6.6 Orthogonal Frequency Division Multiplexing (OFDM).
6.7 Prospect of OFDM-based Applications.
7 CDMA2000 1x High Rate Packet Data System (1xEV-DO).
7.1 Architectural Reference Protocol Model.
7.2 Air Interface Layering Protocol.
7.3 Stream Layer Protocol.
7.4 Session Layer Protocol.
7.5 Connection Layer Protocol.
7.6 Security Layer Protocols.
7.7 MAC Layer Protocols.
7.8 Physical Layer Protocol.
8 CDMA2000 1x Evolution-Data and Voice (1xEV-DV).
8.1 UMTS (WCDMA) Versus CDMA2000—Physical Layer Harmonization.
8.2 Reverse CDMA Channel.
8.3 Forward CDMA Channel.
8.4 CDMA2000 Entities and Service Interfaces.
9 Advanced Encryption Standard and Elliptic Curve Cryptosystems.
9.1 Advanced Encryption Standard (AES).
9.2 Elliptic Curve Cryptosystem (ECC).
9.3 Elliptic Curve Cryptosystem versus Public-Key Cryptosystems.
10 Hash Function, Message Authentication Code, and Data Expansion Function.
10.1 MD5 Message-Digest Algorithm.
10.2 Secure Hash Algorithm (SHA-1).
10.3 Hashed Message Authentication Codes (HMAC).
10.4 Data Expansion Function.
and post it to your social network
Most Helpful Customer Reviews
See all customer reviews >