Fr. 180.00

UMTS SECURITY

English · Hardback

Shipping usually within 3 to 5 weeks

Description

Read more

Zusatztext "...perfectly described by its title...well structured...definitive and highly recommended..." (The IEE Communications Engineer! June/July 2004) Informationen zum Autor Valtteri Niemi received a PhD degree in Mathematics from the University of Turku, Finland in 1989. After serving in various positions at University of Turku, he became an Associate Professor in Mathematics at the University of Vaasa, Finland, during 1993-97. He joined Nokia Research Center, Helsinki in 1997 where he has contributed in several roles for Nokia research in the wireless security area, including cryptological aspects. In 2008, he moved to the new NRC laboratory in Lausanne, Switzerland, where his main focus is on privacy-enhancing technologies. He was nominated as a Nokia Fellow in January 2009. He has participated to the 3GPP SA3 standardization group from the beginning. During 2003-2009 he was the chairman of the group. Before 3GPP, Niemi took part in ETSI SMG 10 for GSM security work. He has published more than 40 scientific articles and he is a co-author of three books. Kaisa Nyberg is the author of UMTS Security , published by Wiley. Klappentext Can you afford not to read this book?........The Universal Mobile Telecommunication System (UMTS) offers a consistent set of services to mobile computer and phone users and numerous different radio access technologies will co-exist within the UMTS system's core network - security is, therefore, of the utmost importance.UMTS Security focuses on the standardized security features of UMTS and brings together material previously only available in specifications, design documents and presentations in one concise form. In addition, this unique volume also covers non-standard implementation specific features that allow differentiation between operators and manufacturers.* Describes the security solutions specified for UMTS* Provides a comprehensive presentation of the UMTS security specifications and explains the role of the security functionality in the UMTS system* Presents the UMTS security system in its totality from the theoretical background through to the design process* Discusses the new security features included in Release 4 and 5By providing a unified treatment of the security services provided by the UMTS system, this volume will provide invaluable information and have instant appeal toplanners, constructers and implementers of UMTS networks, and developers and analysts of application oriented security services that make use of UMTS communication networks. It will also be of considerable interest to postgraduates and researchers of modern communication security technology. Zusammenfassung Can you afford not to read this book?. The Universal Mobile Telecommunication System (UMTS) offers a consistent set of services to mobile computer and phone users and numerous different radio access technologies will co-exist within the UMTS system's core network - security is, therefore, of the utmost importance. Inhaltsverzeichnis Preface xi PART I: SECURITY ARCHITECTURE FOR UMTS 1 1 Introduction to Security and to UMTS 3 1.1 Security in Telecommunications 3 1.1.1 General security principles 4 1.1.2 GSM security 7 1.2 The Background to 3G 11 1.3 The 3G Partnership Project (3GPP) 12 1.4 3GPP Network Architecture 14 1.4.1 Elements in the architecture 15 1.4.2 Protocols in the 3GPP system 18 1.5 WCDMA Radio Technology 20 1.5.1 CDMA: an example 22 1.5.2 Basic facts of WCDMA 23 1.5.3 Handovers 25 1.5.4 Power control 25 2 UMTS Security Features in Release 1999 29 2.1 Access Security to UMTS 29 2.1.1 Mutual authentication 30 2.1.2 Temporary identities 42 2.1.3 UTRAN encryption 44 2.1.4 Integrity protection of RRC signalling 54 2....

List of contents

Preface.
 
PARTV I: SECURITY ARCHITECTURE FOR UMTS.
 
1. Introduction to Security and to UMTS.
 
2. UMTS Secuirty Features in Release 1999.
 
3. Security Features in Release 4 and 5.
 
PART II: CRYPTOGRAPHIC ALGORITHMS.
 
4. Introduction to Cryptography.
 
5. 3GPP Algorithm Specification Principles.
 
6. Confidentiality and Integrity Algorithms.
 
7. Kernel Algorithm KASUMI.
 
8. Authentication and Key Generation Algorithm.
 
9. Notation of Parameters, Sets and Functions.
 
Abbreviations.
 
References.
 
Index.

Report

"...perfectly described by its title...well structured...definitive and highly recommended..." (The IEE Communications Engineer, June/July 2004)

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.