13%
Wireless Communications Security: Solutions for the Internet of Things

Wireless Communications Security: Solutions for the Internet of Things

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

This book describes the current and most probable future wireless security solutions. The focus is on the technical discussion of existing systems and new trends like Internet of Things (IoT). It also discusses existing and potential security threats, presents methods for protecting systems, operators and end-users, describes security systems attack types and the new dangers in the ever-evolving Internet. The book functions as a practical guide describing the evolvement of the wireless environment, and how to ensure the fluent continuum of the new functionalities, whilst minimizing the potential risks in network security.

Table of Contents:
About the Author xii Preface xiii Acknowledgements xv Abbreviations xvi 1 Introduction 1 1.1 Introduction 1 1.2 Wireless Security 2 1.2.1 Background and Advances 2 1.2.2 Statistics 2 1.2.3 Wireless Threats 4 1.2.4 M2M Environment 9 1.3 Standardization 10 1.3.1 The Open Mobile Alliance (OMA) 10 1.3.2 The International Organization for Standardization (ISO) 12 1.3.3 The International Telecommunications Union (ITU) 14 1.3.4 The European Telecommunications Standards Institute (ETSI) 14 1.3.5 The Institute of Electrical and Electronics Engineers (IEEE) 15 1.3.6 The Internet Engineering Task Force (IETF) 16 1.3.7 The 3rd Generation Partnership Project (3GPP) 16 1.3.8 The 3rd Generation Partnership Project 2 (3GPP2) 25 1.3.9 The GlobalPlatform 25 1.3.10 The SIMalliance 26 1.3.11 The Smartcard Alliance 27 1.3.12 The GSM Association (GSMA) 27 1.3.13 The National Institute of Standards and Technology (NIST) 28 1.3.14 The National Highway Transportation and Safety Administration (NHTSA) 28 1.3.15 Other Standardization and Industry Forums 28 1.3.16 The EMV Company (EMVCo) 29 1.3.17 The Personal Computer/Smartcard (PC/SC) 29 1.3.18 The Health Insurance Portability and Accountability Act (HIPAA) 29 1.3.19 The Common Criteria (CC) 29 1.3.20 The Evaluation Assurance Level (EAL) 30 1.3.21 The Federal Information Processing Standards (FIPS) 31 1.3.22 Biometric Standards 31 1.3.23 Other Related Entities 32 1.4 Wireless Security Principles 32 1.4.1 General 32 1.4.2 Regulation 33 1.4.3 Security Architectures 33 1.4.4 Algorithms and Security Principles 33 1.5 Focus and Contents of the Book 36 References 38 2 Security of Wireless Systems 42 2.1 Overview 42 2.1.1 Overall Security Considerations in the Mobile Environment 42 2.1.2 Developing Security Threats 43 2.1.3 RF Interferences and Safety 45 2.2 Effects of Broadband Mobile Data 46 2.2.1 Background 46 2.2.2 The Role of Networks 47 2.2.3 The Role of Apps 50 2.2.4 UE Application Development 52 2.2.5 Developers 55 2.2.6 The Role of the SIM/UICC 56 2.2.7 Challenges of Legislation 57 2.2.8 Updating Standards 58 2.2.9 3GPP System Evolution 58 2.3 GSM 59 2.3.1 The SIM 60 2.3.2 Authentication and Authorization 62 2.3.3 Encryption of the Radio Interface 63 2.3.4 Encryption of IMSI 65 2.3.5 Other GSM Security Aspects 65 2.4 UMTS/HSPA 66 2.4.1 Principles of 3G Security 66 2.4.2 Key Utilization 68 2.4.3 3G Security Procedures 69 2.5 Long Term Evolution 71 2.5.1 Protection and Security Principles 71 2.5.2 X.509 Certificates and Public Key Infrastructure (PKI) 71 2.5.3 IPsec and Internet Key Exchange (IKE) for LTE Transport Security 72 2.5.4 Traffic Filtering 73 2.5.5 LTE Radio Interface Security 74 2.5.6 Authentication and Authorization 78 2.5.7 LTE/SAE Service Security – Case Examples 79 2.5.8 Multimedia Broadcast and Multicast Service (MBMS) and enhanced MBMS (eMBMS) 83 2.6 Security Aspects of Other Networks 91 2.6.1 CDMA (IS‐95) 91 2.6.2 CDMA2000 93 2.6.3 Broadcast Systems 94 2.6.4 Satellite Systems 94 2.6.5 Terrestrial Trunked Radio (TETRA) 95 2.6.6 Wireless Local Area Network (WLAN) 96 2.7 Interoperability 102 2.7.1 Simultaneous Support for LTE/SAE and 2G/3G 102 2.7.2 VoLTE 105 2.7.3 CS Fallback 105 2.7.4 Inter‐operator Security Aspects 106 2.7.5 Wi‐Fi Networks and Offload 106 2.7.6 Femtocell Architecture 108 References 109 3 Internet of Things 112 3.1 Overview 112 3.2 Foundation 113 3.2.1 Definitions 113 3.2.2 Security Considerations of IoT 115 3.2.3 The Role of IoT 115 3.2.4 IoT Environment 117 3.2.5 IoT Market 120 3.2.6 Connectivity 121 3.2.7 Regulation 122 3.2.8 Security Risks 123 3.2.9 Cloud 128 3.2.10 Cellular Connectivity 129 3.2.11 WLAN 133 3.2.12 Low‐Range Systems 133 3.3 Development of IoT 140 3.3.1 GSMA Connected Living 140 3.3.2 The GlobalPlatform 141 3.3.3 Other Industry Forums 141 3.4 Technical Description of IoT 142 3.4.1 General 142 3.4.2 Secure Communication Channels and Interfaces 143 3.4.3 Provisioning and Key Derivation 144 3.4.4 Use Cases 144 References 148 4 Smartcards and Secure Elements 150 4.1 Overview 150 4.2 Role of Smartcards and SEs 151 4.3 Contact Cards 153 4.3.1 ISO/IEC 7816‐1 154 4.3.2 ISO/IEC 7816‐2 155 4.3.3 ISO/IEC 7816‐3 155 4.3.4 ISO/IEC 7816‐4 157 4.3.5 ISO/IEC 7816‐5 157 4.3.6 ISO/IEC 7816‐6 157 4.3.7 ISO/IEC 7816‐7 157 4.3.8 ISO/IEC 7816‐8 157 4.3.9 ISO/IEC 7816‐9 158 4.3.10 ISO/IEC 7816‐10 158 4.3.11 ISO/IEC 7816‐11 158 4.3.12 ISO/IEC 7816‐12 158 4.3.13 ISO/IEC 7816‐13 158 4.3.14 ISO/IEC 7816‐15 158 4.4 The SIM/UICC 159 4.4.1 Terminology 159 4.4.2 Principle 159 4.4.3 Key Standards 160 4.4.4 Form Factors 161 4.5 Contents of the SIM 164 4.5.1 UICC Building Blocks 164 4.5.2 The SIM Application Toolkit (SAT) 167 4.5.3 Contents of the UICC 168 4.6 Embedded SEs 168 4.6.1 Principle 168 4.6.2 M2M Subscription Management 169 4.6.3 Personalization 172 4.6.4 M2M SIM Types 173 4.7 Other Card Types 174 4.7.1 Access Cards 174 4.7.2 External SD Cards 175 4.8 Contactless Cards 175 4.8.1 ISO/IEC Standards 175 4.8.2 NFC 176 4.9 Electromechanical Characteristics of Smartcards 178 4.9.1 HW Blocks 178 4.9.2 Memory 178 4.9.3 Environmental Classes 179 4.10 Smartcard SW 181 4.10.1 File Structure 181 4.10.2 Card Commands 183 4.10.3 Java Card 184 4.11 UICC Communications 184 4.11.1 Card Communications 184 4.11.2 Remote File Management 185 References 186 5 Wireless Payment and Access Systems 188 5.1 Overview 188 5.2 Wireless Connectivity as a Base for Payment and Access 188 5.2.1 Barcodes 189 5.2.2 RFID 191 5.2.3 NFC 192 5.2.4 Secure Element 196 5.2.5 Tokenization 198 5.3 E‐commerce 200 5.3.1 EMV 200 5.3.2 Google Wallet 200 5.3.3 Visa 201 5.3.4 American Express 201 5.3.5 Square 201 5.3.6 Other Bank Initiatives 201 5.3.7 Apple Pay 201 5.3.8 Samsung Pay 202 5.3.9 MCX 202 5.3.10 Comparison of Wallet Solutions 202 5.4 Transport 203 5.4.1 MiFare 204 5.4.2 CiPurse 204 5.4.3 Calypso 204 5.4.4 FeliCa 205 5.5 Other Secure Systems 205 5.5.1 Mobile ID 205 5.5.2 Personal Identity Verification 205 5.5.3 Access Systems 206 References 206 6 Wireless Security Platforms and Functionality 208 6.1 Overview 208 6.2 Forming the Base 208 6.2.1 Secure Service Platforms 209 6.2.2 SEs 209 6.3 Remote Subscription Management 210 6.3.1 SIM as a Basis for OTA 210 6.3.2 TSM 212 6.3.3 TEE 213 6.3.4 HCE and the Cloud 216 6.3.5 Comparison 219 6.4 Tokenization 219 6.4.1 PAN Protection 219 6.4.2 HCE and Tokenization 221 6.5 Other Solutions 221 6.5.1 Identity Solutions 221 6.5.2 Multi‐operator Environment 222 References 222 7 Mobile Subscription Management 223 7.1 Overview 223 7.2 Subscription Management 223 7.2.1 Development 223 7.2.2 Benefits and Challenges of Subscription Management 225 7.3 OTA Platforms 226 7.3.1 General 226 7.3.2 Provisioning Procedure 227 7.3.3 SMS‐based SIM OTA 227 7.3.4 HTTPS‐based SIM OTA 230 7.3.5 Commercial Examples of SIM OTA Solutions 231 7.4 Evolved Subscription Management 232 7.4.1 GlobalPlatform 233 7.4.2 SIMalliance 233 7.4.3 OMA 233 7.4.4 GSMA 235 References 240 8 Security Risks in the Wireless Environment 242 8.1 Overview 242 8.2 Wireless Attack Types 243 8.2.1 Cyber‐attacks 243 8.2.2 Radio Jammers and RF Attacks 244 8.2.3 Attacks against SEs 245 8.2.4 IP Breaches 245 8.2.5 UICC Module 246 8.3 Security Flaws on Mobile Networks 247 8.3.1 Potential Security Weaknesses of GSM 247 8.3.2 Potential Security Weaknesses of 3G 254 8.4 Protection Methods 254 8.4.1 LTE Security 254 8.4.2 Network Attack Types in LTE/SAE 255 8.4.3 Preparation for the Attacks 256 8.5 Errors in Equipment Manufacturing 259 8.5.1 Equipment Ordering 259 8.5.2 Early Testing 260 8.6 Self‐Organizing Network Techniques for Test and Measurement 264 8.6.1 Principle 264 8.6.2 Self‐configuration 265 8.6.3 Self‐optimizing 266 8.6.4 Self‐healing 266 8.6.5 Technical Issues and Impact on Network Planning 266 8.6.6 Effects on Network Installation, Commissioning and Optimization 267 8.6.7 SON and Security 268 References 268 9 Monitoring and Protection Techniques 270 9.1 Overview 270 9.2 Personal Devices 271 9.2.1 Wi‐Fi Connectivity 271 9.2.2 Firewalls 271 9.3 IP Core Protection Techniques 272 9.3.1 General Principles 272 9.3.2 LTE Packet Core Protection 272 9.3.3 Protection against Roaming Threats 275 9.4 HW Fault and Performance Monitoring 276 9.4.1 Network Monitoring 277 9.4.2 Protection against DoS/DDoS 277 9.4.3 Memory Wearing 277 9.5 Security Analysis 278 9.5.1 Post‐processing 278 9.5.2 Real‐time Security Analysis 278 9.6 Virus Protection 279 9.7 Legal Interception 281 9.8 Personal Safety and Privacy 283 9.8.1 CMAS 283 9.8.2 Location Privacy 285 9.8.3 Bio‐effects 286 References 287 10 Future of Wireless Solutions and Security 288 10.1 Overview 288 10.2 IoT as a Driving Force 288 10.3 Evolution of 4G 289 10.4 Development of Devices 291 10.4.1 Security Aspects of Smartcards 291 10.4.2 Mobile Device Considerations 291 10.4.3 IoT Device Considerations 292 10.4.4 Sensor Networks and Big Data 293 10.5 5G Mobile Communications 294 10.5.1 Standardization 294 10.5.2 Concept 295 10.5.3 Industry and Investigation Initiatives 297 10.5.4 Role of 5G in IoT 297 References 297 Index 299


Best Sellers


Product Details
  • ISBN-13: 9781119084396
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 246 mm
  • No of Pages: 336
  • Spine Width: 23 mm
  • Weight: 635 gr
  • ISBN-10: 1119084393
  • Publisher Date: 11 Nov 2016
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Sub Title: Solutions for the Internet of Things
  • Width: 173 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Wireless Communications Security: Solutions for the Internet of Things
John Wiley & Sons Inc -
Wireless Communications Security: Solutions for the Internet of Things
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Wireless Communications Security: Solutions for the Internet of Things

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA