LTE security:
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Chichester
Wiley
2010
|
Schlagworte: | |
Online-Zugang: | Cover image Inhaltsverzeichnis |
Beschreibung: | XII, 284 S. graph. Darst. |
ISBN: | 9780470661031 9780470973288 9780470973271 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV036700827 | ||
003 | DE-604 | ||
005 | 20111006 | ||
007 | t | ||
008 | 101004s2010 xxud||| |||| 00||| eng d | ||
010 | |a 2010022116 | ||
020 | |a 9780470661031 |c hardback |9 978-0-470-66103-1 | ||
020 | |a 9780470973288 |9 978-0-470-97328-8 | ||
020 | |a 9780470973271 |9 978-0-470-97327-1 | ||
035 | |a (OCoLC)700349301 | ||
035 | |a (DE-599)BVBBV036700827 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-83 |a DE-739 |a DE-706 | ||
050 | 0 | |a TK5103.48325 | |
082 | 0 | |a 621.3845/6 | |
084 | |a ZN 6560 |0 (DE-625)157572: |2 rvk | ||
245 | 1 | 0 | |a LTE security |c Dan Forsberg ... |
264 | 1 | |a Chichester |b Wiley |c 2010 | |
300 | |a XII, 284 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
630 | 0 | 7 | |a Long Term Evolution |0 (DE-588)7739053-2 |2 gnd |9 rswk-swf |
650 | 4 | |a Long-Term Evolution (Telecommunications) | |
650 | 4 | |a Global system for mobile communications | |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mobilfunk |0 (DE-588)4170280-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Mobilfunk |0 (DE-588)4170280-3 |D s |
689 | 0 | 1 | |a Long Term Evolution |0 (DE-588)7739053-2 |D u |
689 | 0 | 2 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Forsberg, Dan |e Sonstige |4 oth | |
856 | 4 | |u http://catalogimages.wiley.com/images/db/jimages/9780470661031.jpg |3 Cover image | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020619262&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-020619262 |
Datensatz im Suchindex
_version_ | 1804143340587843584 |
---|---|
adam_text | Contents
Foreword
xi
Acknowledgements
xiii
1
Overview of the Book
1
2
Background
5
2.1
Evolution of Cellular Systems
5
2.1.1
Third-generation Network Architecture
6
2.7.2
Important Elements of the 3G Architecture
7
2.1.3
Functions and Protocols in the 3GPP System
8
2.1.4
The EPS System
8
2.2
Basic Security Concepts
9
2.2.1
Information Security
10
2.2.2
Design Principles
11
2.2.3
Communication Security Features
12
2.3
Basic Cryptographic Concepts
13
2.3.1
Cryptographic Functions
14
2.3.2
Securing Systems with Cryptographic Methods
16
2.3.3
Symmetric Encryption Methods
16
2.3.4
Hash Functions
17
2.3.5
Public-key Cryptography and PKI
18
2.3.6
Cryptanalysis
19
2.4
Introduction to LTE Standardization
21
2.4.1
Working Procedures in 3GPP
21
2.5
Notes on Terminology and Specification Language
25
2.5.
і
Terminology
25
2.5.2
Specification Language
26
3
GSM Security
27
3.1
Principles of GSM Security
27
3.2
The Role of the SIM
28
3.3
Mechanisms of GSM Security
29
3.3.1
Subscriber Authentication in GSM
29
3.3.2
GSM Enctyption
30
3.3.3
GPRS Encryption
3.3.4
User Identity Confidentiality
3.4
GSM Cryptographic Algorithms
4
Third-generation Security (UMTS)
4.1
Principles of Third-generation Security
4.1.1
Elements of GSM Security Carried Over to
3
G
4.1.2
Weaknesses in GSM Security
4.1.3
Higher Level Objectives
4.2
Third-generation Security Mechanisms
4.2.1
Authentication and Key Agreement
4.2.2
Ciphering Mechanism
4.2.3
Integrity Protection Mechanism
4.2.4
Identity Confidentiality Mechanism
A3
Third-generation Cryptographic Algorithms
4.3.1
KASUMI
4.3.2
UEA1 and UIA1
4.3.3
SNOW3G, UEA2 and UIA2
4.3.4
MILENAGE
4.3.5
Hash Functions
4.4
Interworking between GSM and 3G security
4.4.1
Interworking Scenarios
4.4.2
Cases with SIM
4.4.3
Cases with USIM
4.4.4
Handovers between GSM and 3G
4.5
Network Domain Security
4.5.1
Generic Security Domain Framework
4.5.2
Security Mechanisms for NDS
4.5.3
Application of NDS
5
3G-WLAN Interworking
63
5.1
Principles of 3G-WLAN Interworking
63
5.1.1
The General Idea
63
5.1.2
The
ΕΑΡ
Framework
65
5.1.3
Overview of
ΕΑΡ
-AKA
68
5.2
Security Mechanisms of 3G-WLAN Interworking
5.2.1
Reference Model for 3G-WLAN Interworking
5.2.2
Security Mechanisms of WLAN Direct IP Access
5.2.3
Security Mechanisms of WLAN 3GPP IP Access
5.3
Cryptographic Algorithms for 3G-WLAN Interworking
6
EPS Security Architecture
6.1
Overview and Relevant Specifications
6.1.1
Need for Security Standardization
6.1.2
Relevant Non-security Specifications
6.1.3
Security Specifications for EPS
6.2
Requirements and Features of EPS Security
6.2.1
Threats against EPS
86
6.2.2
EPS Security Features
87
6.2.3
How the Features Meet the Requirements
91
6.3
Design Decisions for EPS Security
93
6.4
Platform Security for Base Stations
98
6.4.1
General Security Considerations
98
6.4.2
Specification of Platform Security
98
6.4.3
Exposed Position and Threats
99
6.4.4
Security Requirements
99
7
EPS Authentication and Key Agreement
103
7.1
Identification
103
7.1.1
User Identity Confidentiality
104
7.1.2
Terminal Identity Confidentiality
105
7.2
The EPS Authentication and Key Agreement Procedure
105
7.2.1
Goals and Prerequisites of EPS AKA
107
7.2.2
Distribution of EPS Authentication Vectors from
HSS
to
MME
108
7.2.3
Mutual Authentication and Establishment of a Shared Key
Between the Serving Network and the UE 111
7.2.4
Distribution of Authentication Data Inside and Between
Serving Networks
115
7.3
Key Hierarchy
116
7.3.1
Key Derivations
117
7.3.2
Purpose of the Keys in the Hierarchy
119
7.3.3
Cryptographic Key Separation
120
7.3.4
Key Renewal
121
7.4
Security Contexts
122
8
EPS Protection for Signalling and User Data
127
8.1
Security Algorithms Negotiation
127
8.1.1
Mobility Management Entities
128
8.1.2
Base Stations
128
8.2
NAS
Signalling Protection
130
8.2.1
NAS
Security Mode Command Procedure
130
8.2.2
NAS
Signalling Protection
130
8.3
AS Signalling and User Data Protection
132
8.3.1
AS Security Mode Command Procedure
132
8.3.2
RRC Signalling and User Plane Protection
132
8.3.3
RRC Connection Re-establishment
134
8.4
Security on Network Interfaces
135
8.4.1
Application ofNDS to EPS
135
8.4.2
Security forNetwork Inter]bees of Base Stations
135
8.5
Certificate Enrolment for Base Stations
136
8.5.1
Enrolment Scenario
136
8.5.2
Enrolment Principles
137
8.5.3
Enrolment Architecture
140
8.5.4
CMPv2 Protocol and Certificate Profiles
141
8.5.5
CMPv2 Transport
142
8.5.6
Example Enrolment Procedure
142
8.6
Emergency Call Handling
144
8.6.1
Emergency Calls with
NAS
and AS Security Contexts in Place
145
8.6.2
Emergency Calls without
NAS
and AS Security Contexts
146
8.6.3
Continuation of the Emergency Call when Authentication Fails
146
9
Security in Intra-LTE State Transitions and Mobility
147
9.1
Transitions to and from Registered State
148
9.1.1
Registration
148
9.7.2
Deregistration
148
9.2
Transitions Between Idle and Connected States
149
9.2.1
Connection Initiation
149
9.2.2
Back to Idle State
149
9.3
Idle State Mobility
150
9.4
Handover
152
9.4.7
Handover Key Management Requirements Background
152
9.4.2
Handover Keying Mechanisms Background
153
9.4.3
LTE Key Handling in Handover
157
9.4.4
Multiple Target Cell Preparations
159
9.5
Key Change on the Fly
160
9.5.7
KeNB Rekeying
160
9.5.2 Kenn
Refresh
160
9.5.3
NAS
Key Rekeying
161
9.6
Periodic Local Authentication Procedure
161
9.7
Concurrent Run of Security Procedures
162
10
EPS Cryptographic Algorithms
165
10.1
Null Algorithms
166
10.2
Ciphering Algorithms
167
10.3
Integrity Algorithms
168
10.4
Key Derivation Algorithms
169
11
Interworking Security Between EPS and Other Systems
171
11.1
Interworking with GSM and 3G Networks
171
77.7.7
Routing Area Update Procedure in UTRAN
173
11.1.2
Tracking Area Update Procedure in EPS
175
77.7.5
Handover from EPS to 3G or GSM
177
11.1.4
Handover from 3G or GSM to EPS
178
11.2
Interworking with Non-SGPP Networks
180
11.2.1
Principles of Interworking with Non-SGPP Networks
180
11.2.2
Authentication and Key Agreement for Trusted Access
187
11.2.3
Authentication and Key Agreement for Untrusted Access
191
11.2.4
Security for Mobile IP Signalling
194
77.2.5
Mobility between 3GPP and
поп-ЗСРР
Access Networks
198
12
Security for Voice over LTE
201
12.1
Methods for Providing Voice over LTE
201
72.7.7
IMS over LTE
202
72.7.2
Circuit Switched Fallback (CSFB)
204
72.7
J
Single Radio Voice Call Continuity (SRVCC)
204
12.2
Security Mechanisms for Voice over LTE
205
12.2.1
Security for IMS over LTE
205
12.2.2
Security for Circuit Switched Fallback
213
12.2.3
Security for Single Radio Voice Call Continuity
213
13
Security for Home Base Station Deployment
215
13.1
Security Architecture, Threats and Requirements
216
13.1.1
Scenario
216
13.1.2
Threats and Risks
218
13.1.3
Requirements
220
13.1.4
Security Architecture
221
13.2
Security Features
222
13.2.1
Authentication
222
13.2.2
Local Security
223
13.2.3
Communications Security
225
13.2.4
Location Verification and Time Synchronization
225
13.3
Security Procedures Internal to the Home Base Station
225
13.3.1
Secure Boot and Device Integrity Check
225
13.3.2
Removal of Hosting Party Module
226
13.3.3
Loss of Backhaul Link
226
13.3.4
Secure Time Base
226
13.3.5
Handling of Internal Transient Data
227
13.4
Security Procedures between Home Base Station and Security
Gateway
227
13.4.1
Device Integrity Validation
227
13.4.2
Device Authentication
228
13.4.3
IKEv2 and Certificate Profiling
230
13.4.4
Certificate Processing
233
13.4.5
Combined Device-Hosting Party Authentication
234
13.4.6
Authorization and Access Control
236
13.4.7
IPsec
Tunnel Establishment
238
13.4.8
Time Synchronization
238
13.5
Security Aspects of Home Base Station Management
239
13.5.1
Management Architecture
239
13.5.2
Management and Provisioning during Manufacturing
243
13.5.3
Preparation for Operator-specific Deployment
244
13.5.4
Relationships between HeNB Manufacturer and
Operator
245
13.5.5
Security Management in Operator Network
246
13.5.6
Protection of Management Traffic
246
13.5.7
Software Download
249
13.5.8
Location Verification
250
13.6
Closed Subscriber Groups and Emergency Call Handling
253
13.6.1
UE Access Control to HeNBs
254
13.6.2
Emergency Calls
254
14
Future
Challenges
255
14.1
Near-term
Outlook
255
14.2
Far-term Outlook
260
Abbreviations
263
References
271
Index
279
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV036700827 |
callnumber-first | T - Technology |
callnumber-label | TK5103 |
callnumber-raw | TK5103.48325 |
callnumber-search | TK5103.48325 |
callnumber-sort | TK 45103.48325 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ZN 6560 |
ctrlnum | (OCoLC)700349301 (DE-599)BVBBV036700827 |
dewey-full | 621.3845/6 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.3845/6 |
dewey-search | 621.3845/6 |
dewey-sort | 3621.3845 16 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01788nam a2200469zc 4500</leader><controlfield tag="001">BV036700827</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20111006 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">101004s2010 xxud||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2010022116</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470661031</subfield><subfield code="c">hardback</subfield><subfield code="9">978-0-470-66103-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470973288</subfield><subfield code="9">978-0-470-97328-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470973271</subfield><subfield code="9">978-0-470-97327-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)700349301</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV036700827</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5103.48325</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.3845/6</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 6560</subfield><subfield code="0">(DE-625)157572:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">LTE security</subfield><subfield code="c">Dan Forsberg ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chichester</subfield><subfield code="b">Wiley</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 284 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Long Term Evolution</subfield><subfield code="0">(DE-588)7739053-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Long-Term Evolution (Telecommunications)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Global system for mobile communications</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobilfunk</subfield><subfield code="0">(DE-588)4170280-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mobilfunk</subfield><subfield code="0">(DE-588)4170280-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Long Term Evolution</subfield><subfield code="0">(DE-588)7739053-2</subfield><subfield code="D">u</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Forsberg, Dan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://catalogimages.wiley.com/images/db/jimages/9780470661031.jpg</subfield><subfield code="3">Cover image</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020619262&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020619262</subfield></datafield></record></collection> |
id | DE-604.BV036700827 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:46:06Z |
institution | BVB |
isbn | 9780470661031 9780470973288 9780470973271 |
language | English |
lccn | 2010022116 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020619262 |
oclc_num | 700349301 |
open_access_boolean | |
owner | DE-83 DE-739 DE-706 |
owner_facet | DE-83 DE-739 DE-706 |
physical | XII, 284 S. graph. Darst. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Wiley |
record_format | marc |
spelling | LTE security Dan Forsberg ... Chichester Wiley 2010 XII, 284 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Long Term Evolution (DE-588)7739053-2 gnd rswk-swf Long-Term Evolution (Telecommunications) Global system for mobile communications Sicherheit (DE-588)4054790-5 gnd rswk-swf Mobilfunk (DE-588)4170280-3 gnd rswk-swf Mobilfunk (DE-588)4170280-3 s Long Term Evolution (DE-588)7739053-2 u Sicherheit (DE-588)4054790-5 s DE-604 Forsberg, Dan Sonstige oth http://catalogimages.wiley.com/images/db/jimages/9780470661031.jpg Cover image Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020619262&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | LTE security Long Term Evolution (DE-588)7739053-2 gnd Long-Term Evolution (Telecommunications) Global system for mobile communications Sicherheit (DE-588)4054790-5 gnd Mobilfunk (DE-588)4170280-3 gnd |
subject_GND | (DE-588)7739053-2 (DE-588)4054790-5 (DE-588)4170280-3 |
title | LTE security |
title_auth | LTE security |
title_exact_search | LTE security |
title_full | LTE security Dan Forsberg ... |
title_fullStr | LTE security Dan Forsberg ... |
title_full_unstemmed | LTE security Dan Forsberg ... |
title_short | LTE security |
title_sort | lte security |
topic | Long Term Evolution (DE-588)7739053-2 gnd Long-Term Evolution (Telecommunications) Global system for mobile communications Sicherheit (DE-588)4054790-5 gnd Mobilfunk (DE-588)4170280-3 gnd |
topic_facet | Long Term Evolution Long-Term Evolution (Telecommunications) Global system for mobile communications Sicherheit Mobilfunk |
url | http://catalogimages.wiley.com/images/db/jimages/9780470661031.jpg http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020619262&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT forsbergdan ltesecurity |