0%

Book Description

 

This book describes the current and most probable future wireless security solutions. The focus is on the technical discussion of existing systems and new trends like Internet of Things (IoT). It also discusses existing and potential security threats, presents methods for protecting systems, operators and end-users, describes security systems attack types and the new dangers in the ever-evolving Internet. The book functions as a practical guide describing the evolvement of the wireless environment, and how to ensure the fluent continuum of the new functionalities, whilst minimizing the potential risks in network security.

Table of Contents

  1. Cover
  2. Title Page
  3. About the Author
  4. Preface
  5. Acknowledgements
  6. Abbreviations
  7. 1 Introduction
    1. 1.1 Introduction
    2. 1.2 Wireless Security
    3. 1.3 Standardization
    4. 1.4 Wireless Security Principles
    5. 1.5 Focus and Contents of the Book
    6. References
  8. 2 Security of Wireless Systems
    1. 2.1 Overview
    2. 2.2 Effects of Broadband Mobile Data
    3. 2.3 GSM
    4. 2.4 UMTS/HSPA
    5. 2.5 Long Term Evolution
    6. 2.6 Security Aspects of Other Networks
    7. 2.7 Interoperability
    8. References
  9. 3 Internet of Things
    1. 3.1 Overview
    2. 3.2 Foundation
    3. 3.3 Development of IoT
    4. 3.4 Technical Description of IoT
    5. References
  10. 4 Smartcards and Secure Elements
    1. 4.1 Overview
    2. 4.2 Role of Smartcards and SEs
    3. 4.3 Contact Cards
    4. 4.4 The SIM/UICC
    5. 4.5 Contents of the SIM
    6. 4.6 Embedded SEs
    7. 4.7 Other Card Types
    8. 4.8 Contactless Cards
    9. 4.9 Electromechanical Characteristics of Smartcards
    10. 4.10 Smartcard SW
    11. 4.11 UICC Communications
    12. References
  11. 5 Wireless Payment and Access Systems
    1. 5.1 Overview
    2. 5.2 Wireless Connectivity as a Base for Payment and Access
    3. 5.3 E‐commerce
    4. 5.4 Transport
    5. 5.5 Other Secure Systems
    6. References
  12. 6 Wireless Security Platforms and Functionality
    1. 6.1 Overview
    2. 6.2 Forming the Base
    3. 6.3 Remote Subscription Management
    4. 6.4 Tokenization
    5. 6.5 Other Solutions
    6. References
  13. 7 Mobile Subscription Management
    1. 7.1 Overview
    2. 7.2 Subscription Management
    3. 7.3 OTA Platforms
    4. 7.4 Evolved Subscription Management
    5. References
  14. 8 Security Risks in the Wireless Environment
    1. 8.1 Overview
    2. 8.2 Wireless Attack Types
    3. 8.3 Security Flaws on Mobile Networks
    4. 8.4 Protection Methods
    5. 8.5 Errors in Equipment Manufacturing
    6. 8.6 Self‐Organizing Network Techniques for Test and Measurement
    7. References
  15. 9 Monitoring and Protection Techniques
    1. 9.1 Overview
    2. 9.2 Personal Devices
    3. 9.3 IP Core Protection Techniques
    4. 9.4 HW Fault and Performance Monitoring
    5. 9.5 Security Analysis
    6. 9.6 Virus Protection
    7. 9.7 Legal Interception
    8. 9.8 Personal Safety and Privacy
    9. References
  16. 10 Future of Wireless Solutions and Security
    1. 10.1 Overview
    2. 10.2 IoT as a Driving Force
    3. 10.3 Evolution of 4G
    4. 10.4 Development of Devices
    5. 10.5 5G Mobile Communications
    6. References
  17. Index
  18. End User License Agreement
18.118.45.162