Wireless Mobile Internet Security

Overview

The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies through multiple enhancements of both cellular mobile systems and Internet interoperability. Flawless integration between these two wired/wireless ...

See more details below
Hardcover (New Edition)
$119.21
BN.com price
(Save 4%)$125.00 List Price
Other sellers (Hardcover)
  • All (8) from $88.95   
  • New (7) from $88.95   
  • Used (1) from $119.20   

Overview

The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies through multiple enhancements of both cellular mobile systems and Internet interoperability. Flawless integration between these two wired/wireless networks will enable subscribers to not only roam worldwide, but also to solve the ever increasing demand for data/Internet services. In order to keep up with this noteworthy growth in the demand for wireless broadband, new technologies and structural architectures are needed to greatly improve system performance and network scalability while significantly reducing the cost of equipment and deployment.

Dr. Rhee covers the technological development of wired/wireless internet communications in compliance with each iterative generation up to 4G systems, with emphasis on wireless security aspects. By progressing in a systematic matter, presenting the theory and practice of wired/wireless mobile technologies along with various security problems, readers will gain an intimate sense of how mobile internet systems operate and how to address complex security issues.

Features:

  • Written by a top expert in information security
  • Gives a clear understanding of wired/wireless mobile internet technologies
  • Presents complete coverage of various cryptographic protocols and specifications needed for 3GPP: AES, KASUMI, Public-key and Elliptic curve cryptography
  • Forecast new features and promising 4G packet-switched wireless internet technologies for voice and data communications
  • Provides MIMO/OFDMA-based for 4G systems such as Long Term Evolution (LTE), Ultra Mobile Broadband (UMB), Mobile WiMax or Wireless Broadband (WiBro)
  • Deals with Intrusion Detection System against worm/virus cyber attacks

The book ideal for advanced undergraduate and postgraduate students enrolled in courses such as Wireless Access Networking, Mobile Internet Radio Communications. Practicing engineers in industry and research scientists can use the book as a reference to get reacquainted with mobile radio fundamentals or to gain deeper understanding of complex security issues.

Read More Show Less

Product Details

  • ISBN-13: 9781118496534
  • Publisher: Wiley
  • Publication date: 5/20/2013
  • Edition description: New Edition
  • Edition number: 2
  • Pages: 522
  • Product dimensions: 6.70 (w) x 9.50 (h) x 1.20 (d)

Meet the Author

Dr. Man Young Rhee, Seoul National University, Korea
Man Young Rhee received his B.S.E.E degree from Seoul National University in 1952 and his M.S.E.E and Ph.D. degree from the University of Colorado in 1956 and 1958, respectively. Since 1997, Dr. Rhee has been an Invited Professor of Electrical and Computer Engineering, Seoul National University. He is also Professor Emeritus of Electrical Engineering at Hanyang University, Seoul, Korea. In addition, he has over 45 years of research and teaching experience in the field of communication technologies, coding theory, cryptography, and information security. Dr. Rhee has held a number of high level positions in both government and corporate sectors: President of Samsung Semiconductor Communications; President of Korea Telecommunications Company; Chairman of the Korea Information Security Agency at the Ministry of Information and Communication; President of the Korea Institute of Information Security and Cryptology; and Vice President of the Agency for Defense Development at the Ministry of National Defense.

Read More Show Less

Table of Contents

Preface xiii

About the Author xxi

Acknowledgments xxiii

1 Internetworking and Layered Models 1

1.1 Networking Technology 2

1.2 Connecting Devices 5

1.3 The OSI Model 8

1.4 TCP/IP Model 12

2 TCP/IP Suite and Internet Stack Protocols 15

2.1 Network Layer Protocols 15

2.2 Transport Layer Protocols 41

2.3 World Wide Web 47

2.4 File Transfer 49

2.5 E-Mail 50

2.6 Network Management Service 52

2.7 Converting IP Addresses 53

2.8 Routing Protocols 54

2.9 Remote System Programs 55

2.10 Social Networking Services 56

2.11 Smart IT Devices 57

2.12 Network Security Threats 58

2.13 Internet Security Threats 58

2.14 Computer Security Threats 59

3 Global Trend of Mobile Wireless Technology 63

3.1 1G Cellular Technology 63

3.2 2G Mobile Radio Technology 64

3.3 2.5G Mobile Radio Technology 67

3.4 3G Mobile Radio Technology (Situation and Status of 3G)70

3.5 3G UMTS Security-Related Encryption Algorithm 75

4 Symmetric Block Ciphers 81

4.1 Data Encryption Standard (DES) 81

4.2 International Data Encryption Algorithm (IDEA) 99

4.3 RC5 Algorithm 108

4.4 RC6 Algorithm 123

4.5 AES (Rijndael) Algorithm 135

5 Hash Function, Message Digest, and Message AuthenticationCode 161

5.1 DMDC Algorithm 161

5.2 Advanced DMDC Algorithm 171

5.3 MD5 Message-Digest Algorithm 176

5.4 Secure Hash Algorithm (SHA-1) 188

5.5 Hashed Message Authentication Codes (HMAC) 195

6 Asymmetric Public-Key Cryptosystems 203

6.1 Diffie–Hellman Exponential Key Exchange 203

6.2 RSA Public-Key Cryptosystem 207

6.3 ElGamal’s Public-Key Cryptosystem 215

6.4 Schnorr’s Public-Key Cryptosystem 222

6.5 Digital Signature Algorithm 227

6.6 The Elliptic Curve Cryptosystem (ECC) 230

7 Public-Key Infrastructure 249

7.1 Internet Publications for Standards 250

7.2 Digital Signing Techniques 251

7.3 Functional Roles of PKI Entities 258

7.4 Key Elements for PKI Operations 263

7.5 X.509 Certificate Formats 271

7.6 Certificate Revocation List 282

7.7 Certification Path Validation 287

8 Network Layer Security 291

8.1 IPsec Protocol 291

8.2 IP Authentication Header 299

8.3 IP ESP 301

8.4 Key Management Protocol for IPsec 308

9 Transport Layer Security: SSLv3 and TLSv1 325

9.1 SSL Protocol 325

9.2 Cryptographic Computations 338

9.3 TLS Protocol 339

10 Electronic Mail Security: PGP, S/MIME 353

10.1 PGP 353

10.2 S/MIME 372

11 Internet Firewalls for Trusted Systems 387

11.1 Role of Firewalls 387

11.2 Firewall-Related Terminology 388

11.3 Types of Firewalls 392

11.4 Firewall Designs 398

11.5 IDS Against Cyber Attacks 401

11.6 Intrusion Detections Systems 404

12 SET for E-Commerce Transactions 415

12.1 Business Requirements for SET 415

12.2 SET System Participants 417

12.3 Cryptographic Operation Principles 418

12.4 Dual Signature and Signature Verification 420

12.5 Authentication and Message Integrity 424

12.6 Payment Processing 427

13 4G Wireless Internet Communication Technology 439

13.1 Mobile WiMAX 440

13.2 WiBro (Wireless Broadband) 448

13.3 UMB (Ultra Mobile Broadband) 452

13.4 LTE (Long Term Evolution) 457

Acronyms 467

Bibliography 473

Index 481

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)