Home Page Icon
Home Page
Table of Contents for
Index
Close
Index
by Jyrki T. J. Penttinen
Wireless Communications Security
Cover
Title Page
About the Author
Preface
Acknowledgements
Abbreviations
1 Introduction
1.1 Introduction
1.2 Wireless Security
1.3 Standardization
1.4 Wireless Security Principles
1.5 Focus and Contents of the Book
References
2 Security of Wireless Systems
2.1 Overview
2.2 Effects of Broadband Mobile Data
2.3 GSM
2.4 UMTS/HSPA
2.5 Long Term Evolution
2.6 Security Aspects of Other Networks
2.7 Interoperability
References
3 Internet of Things
3.1 Overview
3.2 Foundation
3.3 Development of IoT
3.4 Technical Description of IoT
References
4 Smartcards and Secure Elements
4.1 Overview
4.2 Role of Smartcards and SEs
4.3 Contact Cards
4.4 The SIM/UICC
4.5 Contents of the SIM
4.6 Embedded SEs
4.7 Other Card Types
4.8 Contactless Cards
4.9 Electromechanical Characteristics of Smartcards
4.10 Smartcard SW
4.11 UICC Communications
References
5 Wireless Payment and Access Systems
5.1 Overview
5.2 Wireless Connectivity as a Base for Payment and Access
5.3 E‐commerce
5.4 Transport
5.5 Other Secure Systems
References
6 Wireless Security Platforms and Functionality
6.1 Overview
6.2 Forming the Base
6.3 Remote Subscription Management
6.4 Tokenization
6.5 Other Solutions
References
7 Mobile Subscription Management
7.1 Overview
7.2 Subscription Management
7.3 OTA Platforms
7.4 Evolved Subscription Management
References
8 Security Risks in the Wireless Environment
8.1 Overview
8.2 Wireless Attack Types
8.3 Security Flaws on Mobile Networks
8.4 Protection Methods
8.5 Errors in Equipment Manufacturing
8.6 Self‐Organizing Network Techniques for Test and Measurement
References
9 Monitoring and Protection Techniques
9.1 Overview
9.2 Personal Devices
9.3 IP Core Protection Techniques
9.4 HW Fault and Performance Monitoring
9.5 Security Analysis
9.6 Virus Protection
9.7 Legal Interception
9.8 Personal Safety and Privacy
References
10 Future of Wireless Solutions and Security
10.1 Overview
10.2 IoT as a Driving Force
10.3 Evolution of 4G
10.4 Development of Devices
10.5 5G Mobile Communications
References
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
10 Future of Wireless Solutions and Security
Next
Next Chapter
End User License Agreement
Index
A5
ABS
access card
ACP
ADF
ADMF
AES
AICD
AID
ALC
AMI
Android
ANDSF
ANSI
APDU
application
management
provider
ARIB
ASME
ASN.1
ATIS
ATR
AuC
authentication
AuC
LTE
network
subscriber
user
Wi‐Fi
authorization
automotive
backhaul
BAN
bandwidth
barcode
BGA
Big Data
bio‐effect
biometric
BIP
BLOCK1/2
Bluetooth
broadcast
Calypso
capacity
CAT
CBEFF
CC
CCM
CCSA
CDMA2000
CDMA (IS‐95)
CEIR
cellular data
CEPT
certificate
Certificate Authority
channel (secure)
CHV
CIP
CiPurse
CLA
CLF
Cloud
CMAS
CoAP
Common Criteria (CC)
contact card
contact management
COUNT
CPU
CSFB
CSG
CSIM
CVM
cyber
DBF
DDoS
DE
DES
device development
DF
DFN
Digital Dividend
DM
DoS
DPI
DRM
EAN
EAP
ECASD
ECC
ECDSA
e‐commerce
EEPROM
EGAN
e‐health
EID
EIR
Elliptic curve
eMBMS
EMC
EMF
EMI
EMP
EMV
EMVCo
encryption
ERP
ERTMS
eSE
eSIM
ESN
ETSI
ETWS
eUICC
EUM
Evaluation Assurance Level (EAL)
fallback
FAN
fault management
FCC
FEC
FeliCa
Femtocell
FID
FIPS
firewall
1FF
5G
FLUTE
Form Factor
4G
4FF
GALILEO
GlobalPlatform
GLONASS
GPRS
GPS
GRX
GSM
algorithms
mobility
protocol stack
security
Spoof BTS
GSMA
Connected Living
eSIM
RSPA
SubMan
HAN
Hash
HCE
HCI
HeNB
HIPAA
HLR
HNB
Hotspot 2.0
HSPA
HTML5
IAN
IANA
IATA
ICAO
ICC
ICCID
ICE
ICT
ID‐1
see
1FF
IDM
ID solutions
IEEE
IEEE 1609
IEEE SG
IEEE 802.1X
IEEE 1363.X
IETF
IKE
IMEI
IMEI database
see
CEIR
IMSI
IMSI catcher
INS
Interference
Introduction
UICC remote provisioning
iOS
IoT
definitions
description
device development
future
GSMA
IoT Forum
regulation
standardization
statistic
threat
IP breach
IPSec
IPX
ISD‐P
ISD‐R
ISIM
ISO
ISO 7501
ISO 7816
ISO 14443
ISO 15693
ISO 18092
ISO 19794
ISO 27000
ITSEC
ITU
IWLAN
JEDEC
Key
derivation
establishment
handling
Ki
LAN
Latency
LCT
Legal Interception (LI)
Legislation
LEMF
LI
location service
6LoWPAN
low‐range connectivity
LPA
LTE
mobility
Release 8
Release 9
Release 10
Release 11
Release 12
security
VoLTE
LUK
malware
manufacturing
MBMS
memory
MFF2
microSD
MiFare
MILENAGE
MIM,
see
M2M
MIMO
MIN
M2M
OMA Lightweight
SIM types
MobileID
mobile payment
barcode
protocol
Mobile Wallet
monitoring
fault monitoring
network monitoring
performance monitoring
M‐plane
MPU
MRTD
MULTOS
MVNO
MVP
NAM
NAN
NAS
NDEF
NERC
NFC
architecture
NFC Forum
standardization
use cases
NHTSA
NIST
NWd
OBU
OCF
ODA
ODM
OEM
Offload
OMA
device management
Lightweight M2M
OPEX
Order Management
OS
OTA
commercial solutions
HTTPS‐based
SIM‐based
PAN
PCBP
PCI
PC/SC
PDS
PET
PETG
phishing
PIN
PIN‐Entry Device
PIV
PKI
PMR
protection
IP core
LTE
LTE core
roaming
protocol
provisioning
PTS
PUK
Push SMS
PVC
QR code
RA
radio interface
encryption
parameters
radio jammer
RF attack
RADIUS
RAM
RAND
RCS
REE
remote management
RFID
architecture
DoS attack
RFM
Roaming
RPM
RRC
RSA
RSP
RTD
RUIM
SA
SAR
SAS
SAT
satellite
SBC
SCP
SCQL
SCWS
SD (card)
SD (secure domain)
SDK
SE
attack
microSD
UICC‐based
2FF
Secure Element (SE)
Security Domain
service
service platform
SON
UICC
Wi‐Fi hotspot
security
analysis
attack types
breach
chain
connected systems
definitions
elements
eMBMS
firewall
GSM
inter‐operator
IoT
IP
key extraction
LTE
MBMS
mobile network
procedure
risks
SAS
secure channel
Secure Element (SE)
SEI
sensor
SG
signaling
SIMalliance
SIM card
container
Form Factor
HW
material
memory
OS
PIN layout
profile
skimmer
Smartcard
see also
SIM card
commands
contactless
environmental class
file structure
HW
memory
Smartcard Alliance
SM‐DP
SMSC
SM‐SR
SoC
SON
SON‐8
SQL
SRES
SRVCC
SSL
standards
5G
SIM
statistics
components
Internet
IoT
market
Subscription Management (SubMan)
ETSI architecture
ETSI use cases
evolved
GP
GSMA
OMA
SIMalliance
SVLTE
SW2
SWd
SWP
Symphony Link
T1
T (protocol)
TCP
TEDS
TEE
telemetry
testing
TETRA
3FF
3GPP
3GPP2
3G
TLS
TMSI
tokenization
ToP
TPDU
transport access
3DES
triple‐SIM
triplet
TSDSI
TSIM
TSM
TTA
TTC
TUAK
2G
UDP
UICC
see also
SIM card
introduction
UMTS
U‐plane
USB
ICC
wireless
utility
UWB
Vehicle‐to‐Vehicle (V2V)
virus protection
VoLTE
VQFN‐8
vulnerability
WAN
WAP
WEP
Wi‐Fi
Wi‐Fi Offload
WIM
WiMAX
WISPr
WLAN
WLCSP
WPA
WPA2
WRC
X2
X.509
ZigBee
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset