This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It is the first book to discuss securing current and next generation telecommunications networks by the security community. The book not on
Security for Telecommunications Networks
โ Scribed by Patrick Traynor, Patrick McDaniel, Thomas La Porta (auth.)
- Publisher
- Springer US
- Year
- 2008
- Tongue
- English
- Leaves
- 184
- Series
- Advances in Information Security 40
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the globe rely upon these systems, as their primary means of connecting to the world around them.
Given the significant focus on securing critical infrastructure in recent years, Security for Telecommunications Networks creates a starting place for new researchers in the field of secure telecommunications networks. This volume not only discusses emerging threats, along with system vulnerability, but also presents the open questions posited by network evolution and defense mechanisms. This is one of the first books to discuss securing current and next generation telecommunications networks by the security community.
Security for Telecommunications Networks is designed for a professional audience composed of practitioners and researchers in industry. This book is also suitable as a secondary text book or reference for advanced-level students in computer science and electrical engineering.
โฆ Table of Contents
Front Matter....Pages I-X
Front Matter....Pages 1-1
Introduction....Pages 1-6
Front Matter....Pages 7-7
Security....Pages 9-22
Cellular Architecture....Pages 23-52
Front Matter....Pages 53-53
Vulnerabilities in the Telephony....Pages 55-64
Vulnerabilities in the Short Messaging Service (SMS)....Pages 65-108
Vulnerabilities in Cellular Data Networks....Pages 109-131
Vulnerabilities in Voice over IP....Pages 133-153
Front Matter....Pages 155-155
Future Directions and Challenges....Pages 157-162
Back Matter....Pages 167-181
โฆ Subjects
Systems and Data Security; Computer Communication Networks; Data Encryption; Data Structures, Cryptology and Information Theory; Computer Systems Organization and Communication Networks
๐ SIMILAR VOLUMES
<p><span>6G networks are expected to provide one-microsecond latency communication with a billion devices competing for resources 1000 times faster than current standards. Increases in network speed, heterogeneity, virtualization, better radio requirements and adaptive communications will place new
<p><span>6G networks are expected to provide one-microsecond latency communication with a billion devices competing for resources 1000 times faster than current standards. Increases in network speed, heterogeneity, virtualization, better radio requirements and adaptive communications will place new
This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version.Telecommunications is a networked business, yet it traditionally has resisted a network-based view in its strategies and business models. In this chapter, Kevin W
Over the last decade, mobile telecommunications has grown dramatically, from a niche technology to a massive industry. As the mobile phone becomes ubiquitous and the divisions between PCs, personal digital assistants, mobiles phones and other mobile devices becomes blurred, the security both of the
This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russia in September 2010. The 16 revised full papers and 6 revised short papers presented