Fr. 150.00

Wireless Communications Security - Solutions for the Internet of Things

English · Hardback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

Informationen zum Autor Jyrki Penttinen has worked in mobile telecommunications with network operators and manufacturers since 1994. He has theoretical knowledge and operational experience of end-to-end architectures and functioning of major mobile communications systems, including GSM/GPRS/EDGE, UMTS/HSPA and LTE/LTE-A with their respective evolution paths. He has worked in research and operational activities in both radio and core network domains, including planning, optimization, measurements, system architectures and services. He joined Giesecke & Devrient Mobile Security team in 2014, currently focusing on the security solutions and future trends of the industry. Klappentext Dieses Buch beschreibt die heutigen und die zukünftig wahrscheinlichsten Sicherheitslösungen für die drahtlose Kommunikation. Der Schwerpunkt liegt auf der technischen Erläuterung bestehender Systeme und neuer Trends wie Internet der Dinge (IoT). Diskutiert werden ebenfalls heutige und potenzielle Sicherheitsbedrohungen. Verfahren für den Schutz von Systemen, Betreibern und Endanwendern, Arten von Angriffen auf Sicherheitssysteme und neue Gefahren in dem sich ständig entwickelnden Internet werden vorgestellt. Das Buch ist ein Praktikerbuch, das die Entwicklung drahtloser Kommunikationsumgebungen erläutert und zeigt, wie neue Funktionen nahtlos integriert und mögliche Risiken im Hinblick auf die Netzwerksicherheit minimiert werden können Zusammenfassung This book describes the current and most probable future wireless security solutions. The focus is on the technical discussion of existing systems and new trends like Internet of Things (IoT). Inhaltsverzeichnis About the Author xiiPreface xiiiAcknowledgements xvAbbreviations xvi1 Introduction 11.1 Introduction 11.2 Wireless Security 21.2.1 Background and Advances 21.2.2 Statistics 21.2.3 Wireless Threats 41.2.4 M2M Environment 91.3 Standardization 101.3.1 The Open Mobile Alliance (OMA) 101.3.2 The International Organization for Standardization (ISO) 121.3.3 The International Telecommunications Union (ITU) 141.3.4 The European Telecommunications Standards Institute (ETSI) 141.3.5 The Institute of Electrical and Electronics Engineers (IEEE) 151.3.6 The Internet Engineering Task Force (IETF) 161.3.7 The 3rd Generation Partnership Project (3GPP) 161.3.8 The 3rd Generation Partnership Project 2 (3GPP2) 251.3.9 The GlobalPlatform 251.3.10 The SIMalliance 261.3.11 The Smartcard Alliance 271.3.12 The GSM Association (GSMA) 271.3.13 The National Institute of Standards and Technology (NIST) 281.3.14 The National Highway Transportation and Safety Administration (NHTSA) 281.3.15 Other Standardization and Industry Forums 281.3.16 The EMV Company (EMVCo) 291.3.17 The Personal Computer/Smartcard (PC/SC) 291.3.18 The Health Insurance Portability and Accountability Act (HIPAA) 291.3.19 The Common Criteria (CC) 291.3.20 The Evaluation Assurance Level (EAL) 301.3.21 The Federal Information Processing Standards (FIPS) 311.3.22 Biometric Standards 311.3.23 Other Related Entities 321.4 Wireless Security Principles 321.4.1 General 321.4.2 Regulation 331.4.3 Security Architectures 331.4.4 Algorithms and Security Principles 331.5 Focus and Contents of the Book 36References 382 Security of Wireless Systems 422.1 Overview 422.1.1 Overall Security Considerations in the Mobile Environment 422.1.2 Developing Security Threats 432.1.3 RF Interferences and Safety 452.2 Effects of Broadband Mobile Data 462.2.1 Background 462.2.2 The Role of Networks 472.2.3 The Role of Apps 502.2.4 UE Application Development 522.2.5 Developers 552.2.6 The Role of the SIM/UICC 562.2.7 Challenges of Legislation 572.2.8 Updating Standards 582.2.9 3GPP System Evolution 582.3 GSM 592.3.1 The SIM 602.3.2 Authentication and Authorization 622.3.3 Encryption of the Radio Interface 632.3.4 Encryption of...

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.