LTE Security, Second Edition by Dan Forsberg, Gunther Horn, Wolf?Dietrich Moeller, Valtteri

By Dan Forsberg, Gunther Horn, Wolf?Dietrich Moeller, Valtteri Niemi(auth.)

A concise, up to date advisor to the 3GPP LTE safeguard Standardization specifications

A welcome Revised variation of the profitable LTE Security addressing the safety structure for SAE/LTE, that is according to parts of the safety architectures for GSM and 3G, yet which wanted an immense remodel as a result of the considerably elevated complexity, and assorted architectural and enterprise specifications of fourth iteration structures. The authors  clarify intimately the protection mechanisms hired to fulfill those requisites. The requirements generated by way of standardization our bodies in basic terms tell approximately find out how to enforce the procedure (and this in basic terms to the level required for interoperability), yet nearly by no means tell readers approximately why issues are performed the best way they're. additionally, necessities are usually readable just for a small staff of specialists and shortage the context of the wider photo. The publication fills this hole by means of offering first hand details from insiders who participated in decisively shaping SAE/LTE safety within the suitable standardization physique, 3GPP, and will hence clarify the reason for layout judgements during this area.

  • A concise, absolutely up to date advisor to the 3GPP LTE safeguard Standardization specifications
  • Describes the basic components of LTE and SAE safety, written via top specialists who participated in decisively shaping SAE/LTE safety within the suitable standardization physique, 3GPP
  • Explains the reason in the back of the factors requisites giving readers a broader knowing of the context to those specifications
  • Includes new chapters overlaying 3GPP paintings on approach improvements for MTC, plus software layer protection in ETSI TC M2M and embedded clever card in ETSI SCP;  safety for Machine-type communique, Relay Node defense, and destiny demanding situations, together with Voice over LTE, MTC,  domestic base stations, LIPA/SIPTO, and New Cryptographic Algorithms

Essential studying for approach engineers, builders and other people in technical revenues operating within the quarter of LTE and LTE defense, verbal exchange engineers and software program builders in cellular conversation field.

Content:
Chapter 1 evaluate of the publication (pages 1–4):
Chapter 2 historical past (pages 5–27):
Chapter three GSM defense (pages 29–36):
Chapter four Third?Generation safeguard (UMTS) (pages 37–65):
Chapter five 3G–WLAN Interworking (pages 67–82):
Chapter 6 EPS safeguard structure (pages 83–107):
Chapter 7 EPS Authentication and Key contract (pages 109–132):
Chapter eight EPS safeguard for Signalling and consumer information (pages 133–154):
Chapter nine safety in Intra?LTE nation Transitions and Mobility (pages 155–173):
Chapter 10 EPS Cryptographic Algorithms (pages 175–181):
Chapter eleven Interworking protection among EPS and different platforms (pages 183–214):
Chapter 12 protection for Voice over LTE (pages 215–232):
Chapter thirteen safeguard for domestic Base Station Deployment (pages 233–280):
Chapter 14 Relay Node protection (pages 281–292):
Chapter 15 safety for Machine?Type Communications (pages 293–308):
Chapter sixteen destiny demanding situations (pages 309–317):

Show description

Read Online or Download LTE Security, Second Edition PDF

Similar nonfiction_9 books

IL-17, IL-22 and Their Producing Cells: Role in Inflammation and Autoimmunity

The information of Th17 cells and different mobile populations which secrete IL-17A, and/or IL-22 has improved vastly because the book of the 1st variation “Th17 Cells: position in irritation and Autoimmune illness” in 2008. the current quantity has been thoroughly revised with the addition of recent chapters at the IL-17 receptor kinfolk and signaling, and an in-depth assessment of IL-22 and innate lymphoid cells.

Ciba Foundation Symposium - Breathing: Hering-Breuer Centenary Symposium

Quantity 1 equipment and functions of facts in scientific Trials, quantity 1: strategies, rules, Trials, and Designs effectively upholds the objectives of the Wiley Encyclopedia of medical Trials via combining either previously-published and newly constructed contributions written by means of over a hundred top teachers, researchers, and practitioners in a finished, approachable layout.

Around the Tree: Semantic and Metaphysical Issues Concerning Branching and the Open Future

During the last few years, the tree version of time has been generally hired to accommodate concerns about the semantics of tensed discourse. the idea that has inspired its adoption is that the main believable strategy to make feel of indeterminism is to conceive of destiny chances as branches that leave from a typical trunk, constituted by way of the prior and the current.

Additional resources for LTE Security, Second Edition

Sample text

This book is entitled LTE Security. We chose this title as ‘LTE’ has become a widely known brand name for the 3GPP-defined successor technology of 3G mobile systems. LTE stands for Long Term Evolution and originally denoted a work item in 3GPP aimed at developing a successor to the 3G radio technology. Gradually it came to denote first the new radio technology itself, then also encompassed the RAN (→ E-UTRAN) and is now also used for the entire system succeeding 3G mobile systems (→ SAE, → EPS) including also the evolved CN (→ EPC), as a quick search for the term LTE on the 3GPP home page [3GPP] will reveal.

E-UTRAN) indicates that an explanation appears further down the list. • LTE. This book is entitled LTE Security. We chose this title as ‘LTE’ has become a widely known brand name for the 3GPP-defined successor technology of 3G mobile systems. LTE stands for Long Term Evolution and originally denoted a work item in 3GPP aimed at developing a successor to the 3G radio technology. Gradually it came to denote first the new radio technology itself, then also encompassed the RAN (→ E-UTRAN) and is now also used for the entire system succeeding 3G mobile systems (→ SAE, → EPS) including also the evolved CN (→ EPC), as a quick search for the term LTE on the 3GPP home page [3GPP] will reveal.

During the authentication procedure, a temporary session key Kc is generated as an output of another one-way function A8. The input parameters for A8 are the same as for A3: Ki and RAND. The session key Kc is subsequently used to encrypt communication on the radio interface. The serving network does not have direct access to the permanent key Ki, so it cannot perform the authentication alone. Instead, all relevant parameters – the authentication triplet (RAND, SRES and Kc) – are sent to the serving network element Mobile Switching Centre/Visitor Location Register (MSC/VLR) (or Serving GPRS Support Node (SGSN) in the case of GPRS) from the AuC.

Download PDF sample

Rated 4.76 of 5 – based on 35 votes