Book description
The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies through multiple enhancements of both cellular mobile systems and Internet interoperability. Flawless integration between these two wired/wireless networks will enable subscribers to not only roam worldwide, but also to solve the ever increasing demand for data/Internet services. In order to keep up with this noteworthy growth in the demand for wireless broadband, new technologies and structural architectures are needed to greatly improve system performance and network scalability while significantly reducing the cost of equipment and deployment.
Dr. Rhee covers the technological development of wired/wireless internet communications in compliance with each iterative generation up to 4G systems, with emphasis on wireless security aspects. By progressing in a systematic matter, presenting the theory and practice of wired/wireless mobile technologies along with various security problems, readers will gain an intimate sense of how mobile internet systems operate and how to address complex security issues.
Features:
Written by a top expert in information security
Gives a clear understanding of wired/wireless mobile internet technologies
Presents complete coverage of various cryptographic protocols and specifications needed for 3GPP: AES, KASUMI, Public-key and Elliptic curve cryptography
Forecast new features and promising 4G packet-switched wireless internet technologies for voice and data communications
Provides MIMO/OFDMA-based for 4G systems such as Long Term Evolution (LTE), Ultra Mobile Broadband (UMB), Mobile WiMax or Wireless Broadband (WiBro)
Deals with Intrusion Detection System against worm/virus cyber attacks
The book ideal for advanced undergraduate and postgraduate students enrolled in courses such as Wireless Access Networking, Mobile Internet Radio Communications. Practicing engineers in industry and research scientists can use the book as a reference to get reacquainted with mobile radio fundamentals or to gain deeper understanding of complex security issues.
Table of contents
- Cover
- Title Page
- Copyright
- Preface
- About the Author
- Acknowledgments
- Chapter 1: Internetworking and Layered Models
-
Chapter 2: TCP/IP Suite and Internet Stack Protocols
- 2.1 Network Layer Protocols
- 2.2 Transport Layer Protocols
- 2.3 World Wide Web
- 2.4 File Transfer
- 2.5 E-Mail
- 2.6 Network Management Service
- 2.7 Converting IP Addresses
- 2.8 Routing Protocols
- 2.9 Remote System Programs
- 2.10 Social Networking Services
- 2.11 Smart IT Devices
- 2.12 Network Security Threats
- 2.13 Internet Security Threats
- 2.14 Computer Security Threats
- Chapter 3: Global Trend of Mobile Wireless Technology
- Chapter 4: Symmetric Block Ciphers
- Chapter 5: Hash Function, Message Digest, and Message Authentication Code
- Chapter 6: Asymmetric Public-Key Cryptosystems
- Chapter 7: Public-Key Infrastructure
- Chapter 8: Network Layer Security
- Chapter 9: Transport Layer Security: SSLv3 and TLSv1
- Chapter 10: Electronic Mail Security: PGP, S/MIME
- Chapter 11: Internet Firewalls for Trusted Systems
- Chapter 12: SET for E-Commerce Transactions
- Chapter 13: 4G Wireless Internet Communication Technology
- Acronyms
- Bibliography
- Index
Product information
- Title: Wireless Mobile Internet Security, 2nd Edition
- Author(s):
- Release date: May 2013
- Publisher(s): Wiley
- ISBN: 9781118496534
You might also like
book
Communications for Control in Cyber Physical Systems
Communications and Controls in Cyber Physical Systems: Theory, Design and Applications in Smart Grids provides readers …
book
Multi-Camera Networks
The first book, by the leading experts, on this rapidly developing field with applications to security, …
book
Designing Secure IoT Devices with the Arm Platform Security Architecture and Cortex-M33
Designing Secure IoT devices with the Arm Platform Security Architecture and Cortex-M33 explains how to design …
book
Physical Security and Safety
How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner …