Rhee, M: Mobile Communication Systems and Security
(Sprache: Englisch)
Mobile Communication Systems and Security arms readers with a thorough understanding of all major cellular air-interface technologies and their security layer techniques. Rhee covers the technological development of wireless mobile communications in...
Leider schon ausverkauft
versandkostenfrei
Buch
116.50 €
Produktdetails
Produktinformationen zu „Rhee, M: Mobile Communication Systems and Security “
Klappentext zu „Rhee, M: Mobile Communication Systems and Security “
Mobile Communication Systems and Security arms readers with a thorough understanding of all major cellular air-interface technologies and their security layer techniques. Rhee covers the technological development of wireless mobile communications in compliance with each iterative generation up to 3G systems and beyond, with an emphasis on wireless security aspects. By progressing in a systematic manner, presenting the theory and practice of wireless mobile technologies along with various security problems, readers will gain an intimate sense of how mobile systems operate and how to address complex security issues.* Written by a top expert in information security* Details each generation of cellular technology* Gives a clear understanding of wireless security protocol analysis* Offers complete coverage of various protocols and specifications in 3GPPs* Forecasts new features and promising technologies* Presents numerical examples in each chapter for easier understanding* Provides source code that can be used for individual practiceThe book is ideal for advanced undergraduate and postgraduate students enrolled in courses such as Wireless Networking, Wireless Security, or Mobile Radio Communications. Practicing engineers in industry and research scientists can use the book as a reference to get reacquainted with mobile radio fundamentals or to gain deeper understanding of the security layer.Access the source code and lecture materials at the companion website: (www.wiley.com/go/rhee)
Arms readers with a well-rounded understanding of all major cellular air-interface technologies and their security layer techniques
Mobile Radio Communications and Wireless Security covers technological development of wireless mobile communications in compliance with each iterative generation over the past decade. It presents the evolution and migration starting from 2G mobile radio technologies to 3G and beyond systems, largely covering packet-switched voice and data communications, with an emphasis on security layer protocols. Topics include GSM and cdmaOne IS-95A (2G), GPRS (2.5G), UMTS along with WCDMA (3G), CDMA2000 1xEV-DO (3G), CDMA2000 1xEV-DV (3G), HSDPA (3.5G), OFDM Radio Access technology (3.5G), AES and Elliptic Curve Cryptograph, Hash Function and Message Digest, HMAC, Data Expansion Technique by P-hash (secret, seed), Pseudo-random Function for Key generation.
- Delves into each iterative generation of cellular technology
- Provides an intimate understanding of security protocol layer techniques
- Written by a top expert in information security
- Presents numerical examples in each chapter for easier understanding
- Comes with code that can be used for individual practice
- Lecture notes available for instructor use
Mobile Radio Communications and Wireless Security covers technological development of wireless mobile communications in compliance with each iterative generation over the past decade. It presents the evolution and migration starting from 2G mobile radio technologies to 3G and beyond systems, largely covering packet-switched voice and data communications, with an emphasis on security layer protocols. Topics include GSM and cdmaOne IS-95A (2G), GPRS (2.5G), UMTS along with WCDMA (3G), CDMA2000 1xEV-DO (3G), CDMA2000 1xEV-DV (3G), HSDPA (3.5G), OFDM Radio Access technology (3.5G), AES and Elliptic Curve Cryptograph, Hash Function and Message Digest, HMAC, Data Expansion Technique by P-hash (secret, seed), Pseudo-random Function for Key generation.
- Delves into each iterative generation of cellular technology
- Provides an intimate understanding of security protocol layer techniques
- Written by a top expert in information security
- Presents numerical examples in each chapter for easier understanding
- Comes with code that can be used for individual practice
- Lecture notes available for instructor use
Inhaltsverzeichnis zu „Rhee, M: Mobile Communication Systems and Security “
CHAPTER 1 Global System for Mobile Communications1.1 GSM Bandwidth Allocation
1.2 GSM System Architecture
1.3 GSM Transmission Network Architecture
1.4 Signalling Channels on the Air Interface
1.5 GSM Security Architecture
CHAPTER 2 cdmaOne IS-95A Technology
I. Reverse CDMA Channel
2.1 Reverse Traffic Channel
2.2 Access Channel
2.3 Multiplex Option 1 Information
2.4 Multiplex Option 2 Information
II. Forward CDMA Channel
2.5 Pilot Channel
2.6 Sync Channel
2.7 Paging Channel
2.8 Forward Traffic Channel
CHAPTER 3 General Packet Radio Service (GPRS)
3.1 GPRS System Architecture
3.2 GPRS Logical Functions
3.3 Layered Protocol Architecture of Transmission Plane
3.4 GPRS Ciphering Algorithm
CHAPTER 4 Third Generation Partnership Projects
4.1 3G Partnership Projects
4.2 Evolution of Mobile Radio Technologies
4.3 Cryptographic Protocols Applicable to Wireless Security Technologies
CHAPTER 5 Universal Mobile Telecommunication System
5.1 UMTS Standardization
5.2 FDD/TDD modes for UTRA Operation
5.3 UMTS Architecture
5.4 UTRAN Architecture
5.5 UTRAN Terrestrial Interface
5.6 UTRAN-CN Interface via Iu
5.7 UMTS Security Related Features
5.8 UTRAN Overall Functions
5.9 UTRAN Iub Interface Protocol Structure
CHAPTER 6 High Speed Downlink Packet Access (HSDPA)
6.1 Basic Structure of HS-DSCH
6.2 Overview of HSDPA Enhancement Technologies
6.3 HS-DSCH MAC Architecture - UE side
6.4 HS-DSCH MAC Architecture-UTRAN side
6.5 Overview of HSDPA Techniques to Support UTRA
6.6 Orthogonal Frequency Division Multiplexing (OFDM)
6.7 Prospect of OFDM-based Applications
CHAPTER 7 CDMA 2000 1x High Rate Packet Data System (1xEV-DO)
7.1 Architectural Reference Protocol Model
7.2 Air Interface Layering Protocol
7.3 Stream Layer Protocol
7.4 Session Layer Protocol
7.5 Connection Layer Protocol
7.6 Security Layer Protocols
7.7 MAC Layer Protocols
7.8 Physical Layer Protocol
CHAPTER 8 CDMA2000 1x Evolution-Data and Voice (1x EV-DV)
8.1
... mehr
UMTS (WCDMA) versus CDMA2000 - Physical Layer Harmonization
8.2 Reverse CDMA Channel
8.3 Forward CDMA Channel
8.4 CDMA 2000 Entities and Service Interfaces
CHAPTER 9 Advanced Encryption Standard and Elliptic Curve Cryptosystems
9.1 Advanced Encryption Standard (AES)
9.2 Elliptic Curve Cryptosystem (ECC)
9.3 Elliptic Curve Cryptosystem versus Public-key Cryptosystems
CHAPTER 10 Hash Function, Message Authentication Code and Data Expansion Function
10.1 MD5 Message-Digest Algorithm
10.2 Secure Hash Algorithm (SHA-1)
10.3 Hashed Message Authentication Codes (HMAC)
10.4 Data Expansion Function
8.2 Reverse CDMA Channel
8.3 Forward CDMA Channel
8.4 CDMA 2000 Entities and Service Interfaces
CHAPTER 9 Advanced Encryption Standard and Elliptic Curve Cryptosystems
9.1 Advanced Encryption Standard (AES)
9.2 Elliptic Curve Cryptosystem (ECC)
9.3 Elliptic Curve Cryptosystem versus Public-key Cryptosystems
CHAPTER 10 Hash Function, Message Authentication Code and Data Expansion Function
10.1 MD5 Message-Digest Algorithm
10.2 Secure Hash Algorithm (SHA-1)
10.3 Hashed Message Authentication Codes (HMAC)
10.4 Data Expansion Function
... weniger
Autoren-Porträt von Man Young Rhee
ManYoung Rhee is an Endowed Chair Professor atKyung Hee University and has over 45 years of research and teaching experience in the field of communication technologies, coding theory, cryptography, and information security. His career in academia includes professorships at Hanyang University (he also held the position of Vice President at this university), Virginia Tech, Seoul National University, and the University of Tokyo. Dr Rhee has held a number of high level positions in both government and corporate sectors: President of Samsung Semiconductor Communications; President of Korea Telecommunications Company; Chairman of the Korea Information Security Agency at the Ministry of Information and Communication; President of the Korea Institute of Information Security and Cryptology; and Vice President of the Agency for Defense Development at the Ministry of National Defense. He is a Member of the National Academy of Sciences, Senior Fellowat theKorea Academy of Science and Technology, and an Honorary Member of the National Academy of Engineering of Korea. His awards include the ''Dongbaek'' Order of National Service Merit and the "Mugunghwa" Order of National Service Merit, the highest grade honor for a scientist inKorea,NASPrize, the National Academy of Sciences, NAEK Grand Prize, the National Academy of Engineering of Korea, and Information Security Grand Prize, KIISC. He has also published the following four books: Coding, Cryptography, and Mobile Communications: Internet Security, John Wiley, 2003; CDMA Cellular Mobile Communications and Network Security, Prentice Hall, 1998; Cryptography and Secure Communications, McGraw-Hill, 1994; and Error Correcting Coding Theory, McGraw-Hill, 1989. Dr Rhee has a B.S. in Electrical Engineering from Seoul National University, and an M.S. in Electrical Engineering and a Ph.D. from the University of Colorado.
Bibliographische Angaben
- Autor: Man Young Rhee
- 2009, 480 Seiten, Maße: 17,4 x 25,5 cm, Gebunden, Englisch
- Verlag: Wiley John + Sons
- ISBN-10: 0470823364
- ISBN-13: 9780470823361
Sprache:
Englisch
Kommentar zu "Rhee, M: Mobile Communication Systems and Security"
0 Gebrauchte Artikel zu „Rhee, M: Mobile Communication Systems and Security“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Rhee, M: Mobile Communication Systems and Security".
Kommentar verfassen