Here is the new Book on LTE SECURITY written by Dan Forsberg,Valtteri Niemi i hope you guys will like this book.
Contents:
1 Overview of the Book 1
2 Background 5
2.1 Evolution of Cellular Systems 5
2.2 Basic Security Concepts 9
2.3 Basic Cryptographic Concepts 13
2.4 Introduction to LTE Standardization 21
2.5 Notes on Terminology and Specification Language 25
3 GSM Security 27
3.1 Principles of GSM Security 27
3.2 The Role of the SIM 28
3.3 Mechanisms of GSM Security 29
3.4 GSM Cryptographic Algorithms 32
4 Third-generation Security (UMTS) 35
4.1 Principles of Third-generation Security 35
4.2 Third-generation Security Mechanisms 37
4.3 Third-generation Cryptographic Algorithms 46
4.4 Interworking between GSM and 3G security 51
4.5 Network Domain Security 55
5 3G–WLAN Interworking 63
5.1 Principles of 3G–WLAN Interworking 63
5.2 Security Mechanisms of 3G–WLAN Interworking 70
5.3 Cryptographic Algorithms for 3G–WLAN Interworking 77
6 EPS Security Architecture 79
6.1 Overview and Relevant Specifications 79
6.2 Requirements and Features of EPS Security 85
6.3 Design Decisions for EPS Security 93
6.4 Platform Security for Base Stations 98
7 EPS Authentication and Key Agreement 103
7.1 Identification 103
7.2 The EPS Authentication and Key Agreement Procedure 105
7.3 Key Hierarchy 116
7.4 Security Contexts 122
8 EPS Protection for Signalling and User Data 127
8.1 Security Algorithms Negotiation 127
8.2 NAS Signalling Protection 130
8.3 AS Signalling and User Data Protection 132
8.4 Security on Network Interfaces 135
8.5 Certificate Enrolment for Base Stations 136
9 Security in Intra-LTE State Transitions and Mobility 147
9.1 Transitions to and from Registered State 148
9.2 Transitions Between Idle and Connected States 149
9.3 Idle State Mobility 150
9.4 Handover 152
9.5 Key Change on the Fly 160
9.6 Periodic Local Authentication Procedure 161
9.7 Concurrent Run of Security Procedures 162
10 EPS Cryptographic Algorithms 165
10.1 Null Algorithms 166
10.2 Ciphering Algorithms 167
10.3 Integrity Algorithms 168
10.4 Key Derivation Algorithms 169
11 Interworking Security Between EPS and Other Systems 171
11.1 Interworking with GSM and 3G Networks 171
11.2 Interworking with Non-3GPP Networks 180
12 Security for Voice over LTE 201
12.1 Methods for Providing Voice over LTE 201
13 Security for Home Base Station Deployment 215
13.1 Security Architecture, Threats and Requirements 216
13.2 Security Features 222
13.3 Security Procedures Internal to the Home Base Station 225
14 Future Challenges 255
14.1 Near-term Outlook 255
14.2 Far-term Outlook 260
Here is the new Book on LTE SECURITY written by Dan Forsberg,Valtteri Niemi i hope you guys will like this book.
Contents:
1 Overview of the Book 1
2 Background 5
2.1 Evolution of Cellular Systems 5
2.2 Basic Security Concepts 9
2.3 Basic Cryptographic Concepts 13
2.4 Introduction to LTE Standardization 21
2.5 Notes on Terminology and Specification Language 25
3 GSM Security 27
3.1 Principles of GSM Security 27
3.2 The Role of the SIM 28
3.3 Mechanisms of GSM Security 29
3.4 GSM Cryptographic Algorithms 32
4 Third-generation Security (UMTS) 35
4.1 Principles of Third-generation Security 35
4.2 Third-generation Security Mechanisms 37
4.3 Third-generation Cryptographic Algorithms 46
4.4 Interworking between GSM and 3G security 51
4.5 Network Domain Security 55
5 3G–WLAN Interworking 63
5.1 Principles of 3G–WLAN Interworking 63
5.2 Security Mechanisms of 3G–WLAN Interworking 70
5.3 Cryptographic Algorithms for 3G–WLAN Interworking 77
6 EPS Security Architecture 79
6.1 Overview and Relevant Specifications 79
6.2 Requirements and Features of EPS Security 85
6.3 Design Decisions for EPS Security 93
6.4 Platform Security for Base Stations 98
7 EPS Authentication and Key Agreement 103
7.1 Identification 103
7.2 The EPS Authentication and Key Agreement Procedure 105
7.3 Key Hierarchy 116
7.4 Security Contexts 122
8 EPS Protection for Signalling and User Data 127
8.1 Security Algorithms Negotiation 127
8.2 NAS Signalling Protection 130
8.3 AS Signalling and User Data Protection 132
8.4 Security on Network Interfaces 135
8.5 Certificate Enrolment for Base Stations 136
9 Security in Intra-LTE State Transitions and Mobility 147
9.1 Transitions to and from Registered State 148
9.2 Transitions Between Idle and Connected States 149
9.3 Idle State Mobility 150
9.4 Handover 152
9.5 Key Change on the Fly 160
9.6 Periodic Local Authentication Procedure 161
9.7 Concurrent Run of Security Procedures 162
10 EPS Cryptographic Algorithms 165
10.1 Null Algorithms 166
10.2 Ciphering Algorithms 167
10.3 Integrity Algorithms 168
10.4 Key Derivation Algorithms 169
11 Interworking Security Between EPS and Other Systems 171
11.1 Interworking with GSM and 3G Networks 171
11.2 Interworking with Non-3GPP Networks 180
12 Security for Voice over LTE 201
12.1 Methods for Providing Voice over LTE 201
13 Security for Home Base Station Deployment 215
13.1 Security Architecture, Threats and Requirements 216
13.2 Security Features 222
13.3 Security Procedures Internal to the Home Base Station 225
14 Future Challenges 255
14.1 Near-term Outlook 255
14.2 Far-term Outlook 260
NOTE: password file is attached within zip.
If u like this book press Thanks Button.
Hi,
I am not able to unzip it. It ask password to extract even the password file. Please mention the password in thread itself.
Bookmarks