Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
Entity Authentication and Personal Privacy in Future Cellular Systems (Hardcover)
Loot Price: R2,935
Discovery Miles 29 350
|
|
Entity Authentication and Personal Privacy in Future Cellular Systems (Hardcover)
Expected to ship within 12 - 19 working days
|
In the first quarter of 2009, there were more than 4 billion
subscribers to cellular phone services in the world and this number
is constantly growing. With this in mind it should be clear that
use of mobile communication has already become both pervasive and
ubiquitous. It has become a global commodity really. Entity
Authentication and Personal Privacy in Future Cellular Systems aims
at explaining and examining access security as it is found in
mobile/cellular systems. A thorough investigation of how access
security and personal privacy is handled in the 3GPP system is
conducted. This includes both the 2G systems GSM/GPRS and the 3G
system UMTS. The emerging fourth generation LTE architecture is
also examined. The first part of the book deals exclusively with
presenting access security as found in the 3GPP system. Particular
attention is given to the authentication and key agreement
procedures. The 3GPP systems have evolved and the access security
architecture in LTE is substantially more advanced and mature than
what you would find in GSM/GPRS, but even the LTE security
architecture has its limitations. In part two of the book we go on
to examine what is missing from the current cellular access
security architectures. Some of the shortcomings found in GSM/GPRS
and later UMTS have been partially addressed in LTE, but the burden
of backwards compatibility has meant that many issues could not
easily be resolved. Free from those restrictions, we shall see that
one can provide substantially improved subscriber privacy and
enhanced entity authentication, while also avoiding the delegated
authentication control that all 3GPP systems have. The design of
authentication protocols is discussed in depth, and this would also
include looking into the role of formal verification in the design
of security protocols.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.