Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Security in Next Generation Mobile Networks: SAE/LTE and WiMAX

Posted By: arundhati
Security in Next Generation Mobile Networks: SAE/LTE and WiMAX

Anand R. Prasad, "Security in Next Generation Mobile Networks: SAE/LTE and WiMAX "
English | ISBN: 8792329632 | 2011 | 242 pages | PDF | 4 MB

Starting from voice services with simple terminals, a mobile device today is nothing short of a small PC in the form of smart-phones. The result has been a huge increase in data-services, giving mobile communication access to critical aspects of human life. This has led to the standardization of System Architecture Evolution/Long Term Evolution (SAE/LTE) by 3GPP and IEEE 802.16e / WiMAX. Together with penetration of mobile communications and new standardization come new security issues and, thus, the need for new security solutions.

Security in Next Generation Mobile Networks provides a fresh look at those security aspects with the main focus on the latest security developments in 3GPP SAE/LTE and WiMAX. SAE/LTE is also known as Evolved Packet System (EPS). This book includes six chapters, the first three serving as introductory text, and the remaining three providing more in-depth discussions.

Chapter One gives a background of Next Generation Mobile Networks (NGMN) activity and requirements. Following this explanation, Chapter Two provides an overview of security, telecommunication systems, and their requirements, and Chapter Three provides some background on standardization.

Chapter Four discusses the EPS (or SAE/LTE) security architecture developed by 3GPP. In particular, this chapter covers the authentication and key agreement method for SAE/LTE together with newly defined key hierarchy. This chapter also addresses the challenging aspects of SAE/LTE interworking and mobility with UMTS together with the necessary key-exchange technologies. Chapter Five provides an in-depth discussion of the WiMAX security requirements, the authentication aspects of PKMv2, and the overall WiMAX network security aspects. In Chapter Six, the text briefly covers security for:

•Home(evolved)NodeB, which is the Femto solution from 3GPP
•Machine-to-Machine (M2M)
•Multimedia Broadcast and Multicast Service (MBMS) and Group Key Management.

The intended audience for this book is mobile network and device architects, designers, researchers, and students. The goal of the authors, who have a combined experience of more than 25 years in mobile security standardization, architecture, research, and education, is to provide readers with a fresh, up-to-date look at the architecture and challenges of EPS and WiMAX security.
Read more