Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and
Security for mobile networks and platforms
โ Scribed by Selim Aissi, Nora Dabbous, Anand R. Prasad
- Publisher
- Artech House
- Year
- 2006
- Tongue
- English
- Leaves
- 333
- Series
- Artech House universal personal communications series
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers, architects, and engineers into mobile security specialists. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology's security weaknesses and provides comprehensive countermeasures to thwart threats. It explains in language geared for networking professionals the essentials of the latest security standards and protocols. Most importantly, the book pinpoints security issues encountered end-to-end throughout an entire mobile network. The book's complete catalog of security vulnerabilities ensures that all viable security measures are taken. A practical, hands-on discussion of promising next-generation research into mobile security prepares mobile professionals for the ever-looming next waves of security threats.
โฆ Table of Contents
Security for Mobile Networks and Platforms......Page 2
Contents......Page 6
Preface......Page 16
1.1 Overview......Page 18
1.2 Trusted Mobile Platforms......Page 23
1.3 Overview of the Book......Page 28
References......Page 29
2.2 Authentication......Page 30
2.3 Authorization......Page 34
2.4 Non-Repudiation......Page 36
References......Page 38
3 Cryptographic Techniques......Page 40
3.1 GSM Algorithms......Page 41
3.2 GPP Algorithms......Page 47
3.3 Bluetooth......Page 51
3.4 The 802.11 Standard......Page 55
References......Page 60
4.1 Introduction......Page 62
4.2 Threats Addressed by Hardware Protection......Page 63
4.3 Hardware Security Solutions......Page 65
References......Page 83
5.1 Introduction......Page 84
5.3 Elements of Mobile Security......Page 85
5.4 Communications Software Security......Page 86
5.5 Mobile OS Security......Page 88
5.6 Web Services Security......Page 92
5.7 Content Protection......Page 96
5.8 Managed Runtime Security......Page 100
5.9 Access Control......Page 106
References......Page 107
6.1 Introduction......Page 110
6.2 Security Certification Schemes......Page 112
6.3 Privacy Aspects......Page 117
References......Page 119
7 Higher Layer Security......Page 122
7.1 SSL and TLS Protocols......Page 123
7.2 Other Higher Layer Protocols......Page 129
7.3 Known Issues and Possible Solutions......Page 130
7.4 Security in WAP......Page 131
References......Page 133
8 IP Layer Security......Page 134
8.1 AH and ESP......Page 136
8.2 Key Management......Page 139
8.4 Network Address Translation......Page 141
8.5 VPN......Page 143
8.6 Mobile IP and IPsec......Page 146
References......Page 151
9.1 AAA Basics......Page 152
9.2 AAA Protocols......Page 155
9.3 MIP and AAA......Page 159
9.4 Wireless Internet Service Provider Roaming......Page 160
9.5 AAA in Mobile Systems......Page 162
References......Page 165
10 IEEE 802.1X and EAP......Page 166
10.1 IEEE 802.1X......Page 167
10.2 EAP......Page 169
References......Page 179
11.2 Bluetooth......Page 180
11.3 Other Emerging WPAN Technologies......Page 190
References......Page 193
12 WLANs Security......Page 194
12.1 Security in IEEE 802.11......Page 195
12.2 IEEE 802.11 Security Issues......Page 197
12.3 Countermeasures......Page 202
12.4 WPA and IEEE 802.11i RSN......Page 203
12.5 Secure WLAN Deployment......Page 212
References......Page 231
13.1 An Introduction to 802.16......Page 234
13.2 IEEE 802.16-2004 Security......Page 240
13.3 PKM Security Issues......Page 243
13.4 PKMv2......Page 244
References......Page 247
14.1 GSM Security......Page 248
14.2 3GPP Security......Page 254
References......Page 259
15.1 Introduction......Page 262
15.2 The Need for Future Generation Communications......Page 264
15.3 Defining the Future......Page 268
15.4 Technologies......Page 273
15.5 Other Technologies......Page 278
15.6 Future Development: Protocol Layers and Technologies......Page 279
15.7 Wireless Standards Activities Toward the Future......Page 282
15.8 Standardization and Regulations......Page 285
15.9 Mobile Networks Security Issues......Page 286
15.10 Mobile Platforms Security Issues......Page 290
15.11 Conclusions......Page 292
References......Page 293
16.1 Software Threats......Page 294
16.3 Network Threats......Page 297
16.4 Protections Means......Page 302
References......Page 303
List of Acronyms......Page 304
About the Authors......Page 318
Index......Page 320
๐ SIMILAR VOLUMES
This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobile Healthcare Network (MHN) architecture and its diverse applications, and reviews the existing works on security and privacy for MHNs. Critical future ch
<p><p> This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobile Healthcare Network (MHN) architecture and its diverse applications, and reviews the existing works on security and privacy for MHNs. Critical fu
<span>Multimodal Perception and Secure State Estimation for Robotic Mobility Platforms</span><p><span>Enables readers to understand important new trends in multimodal perception for mobile robotics </span></p><p><span>This book provides a novel perspective on secure state estimation and multimodal p
The book presents novel research in the areas of social identity and security when using mobile platforms. The topics cover a broad range of applications related to securing social identity as well as the latest advances in the field, including the presentation of novel research methods that are in
Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet