Description
With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern in the mobile communications industry. Helping you become a mobile security specialist, this timely resource explains the essentials of the latest security standards and protocols. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology's weaknesses and provides you with comprehensive countermeasures. Most importantly, the book pinpoints security issues encountered end-to-end throughout an entire mobile network. You find a complete catalog of security vulnerabilities to ensure that every security measure is taken. Moreover, this forward-looking reference includes a practical, hands-on discussion of promising next-generation research into mobile security that helps prepare you for the ever-looming next waves of security threats.
Table Of Contents
Introduction.; Authentication, Authorization, and Non-Repudiation - Authentication. Authorization. Non-Repudiation. Cryptographic Techniques - 3.1GSM Algorithms. 3.23GPP Algorithms. 3.3Bluetooth. 3.4802.11. Hardware Security - Threats Addressed by Hardware. Software Security - The New Risks. Elements of Mobile Security. Communication Software Security. Operating System Security. Web Services Security. Content Protection. Managed Runtime Security. Access Control. Security Certification and Evaluation - Security Certification Schemes. Privacy Aspects. Higher Layer Security - SSL and TLS Protocols. Other Higher Layer Protocols. Known Issues and Possible Solutions. Security in WAP. IP Layer Security - AH and ESP. Key Management. IP Address Translation. VPN. Mobile IP and IPSec. AAA - AAA Basics. AAA Protocols. Mobile IP and AAA. WISPr. AAA in Mobile Systems. IEEE 802.1X and EAP - IEEE 802.1x. Extensible Authentication Protocol. WPAN Security - Bluetooth. Other Emerging WPAN Technologies. WLAN Security - Security in IEEE 802.11. IEEE 802.11 Security Issues. Countermeasures. WPA and IEEE 802.11i RSN. Secure WLAN Deployment. WMAN Security - IEEE 802.16: anIntroduction. IEEE 802.16-2004 Security. PKM Security Issues. PKMv2. WWAN Security - GSM Security. 3GPP Security. Future Security Challenges - The Need for Future Generation Communications. Defining the Future. Technologies. Other Technologies. Future Development: Protocol Layers and Technologies. Wireless Standards Activities towards the Future. Standardization and Regulations. Mobile Networks Security Issues. Mobile Platforms Security Issues. Mobile Security Threat Catalog - Software Threats. Hardware Threats. Network Threats. Protections Means. Index. List of Abbreviations and Symbols. Biographies.
Author
-
Selim I. Aissi
Selim I. Aissi is a Manager and Chief Architect of Manageability and Security for next-generation mobile platforms at Intel Corporation's Mobile Platform Group. He attended the University of Michigan, where he earned M.S. and PhD degrees in aerospace engineering. He is a Certified Information Systems Security Professional (CISSP), Senior Member of IEEE, and had served on the editorial and technical boards of several journals and conferences.
-
Nora Dabbous
-
Anand Prasad
Anand Prasad is a senior researcher at DoCoMo Euro-Labs, Munich, Germany. He earned his Ph.D. for studies on IP-based WLANs: protocols, security and deployment at Delft University of Technology, The Netherlands.