Security of Mobile Communications
The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels—from subscriber to network operator to service provider.
Providing technicians and designers with a critical and comprehensive resource, Security of Mobile Communications brings together the policies, practices, and guidelines needed to identify and address the security issues related to today’s wireless sensor networks, satellite services, mobile e-services, and inter-system roaming and interconnecting systems. It details the major mobile standards for securing mobile communications and examines the architectures able to provide data confidentiality, authentication, integrity, and privacy in various wireless environments.
This book will serve as an invaluable resource for those looking to identify and ameliorate security issues. Professor Noureddine Boudriga, an internationally recognized authority, goes beyond analysis, standards, and guidelines to define the roles and responsibilities that network operators, service providers, and even customers need to fulfill to assure our mobile communications are as secure as they are prolific.
What people are saying - Write a review
Chapter 2 Access Control and Authentication in Mobile Communications
Chapter 3 Common Techniques for Mobile Communications Security
The SIMUSIM Case
SECURITY OF NETWORKBASED SERVICES IN MOBILE COMMUNICATIONS
Chapter 9 InterSystem Roaming and Internetworking Security
Chapter 10 Securing Mobile Services
Chapter 11 Security of Mobile Sensor Networks
Chapter 12 Security of Satellite Services
PROTECTION TECHNIQUES FOR MOBILE APPLICATIONS
Chapter 13 Security of Mobile Payments
Chapter 14 Security of Mobile Voice Communications
ATTACK AND PROTECTION TECHNIQUES IN MOBILE COMMUNICATION NETWORKS
Chapter 5 Security of GSM Networks
Chapter 6 Security of 3G Networks
Chapter 7 Wireless Local Area Network Security
Chapter 8 Security of Ad Hoc Networks