You are previewing Wireless Mobile Internet Security, 2nd Edition.
O'Reilly logo
Wireless Mobile Internet Security, 2nd Edition

Book Description

The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies through multiple enhancements of both cellular mobile systems and Internet interoperability. Flawless integration between these two wired/wireless networks will enable subscribers to not only roam worldwide, but also to solve the ever increasing demand for data/Internet services. In order to keep up with this noteworthy growth in the demand for wireless broadband, new technologies and structural architectures are needed to greatly improve system performance and network scalability while significantly reducing the cost of equipment and deployment.

Dr. Rhee covers the technological development of wired/wireless internet communications in compliance with each iterative generation up to 4G systems, with emphasis on wireless security aspects. By progressing in a systematic matter, presenting the theory and practice of wired/wireless mobile technologies along with various security problems, readers will gain an intimate sense of how mobile internet systems operate and how to address complex security issues.

Features:

  • Written by a top expert in information security

  • Gives a clear understanding of wired/wireless mobile internet technologies

  • Presents complete coverage of various cryptographic protocols and specifications needed for 3GPP: AES, KASUMI, Public-key and Elliptic curve cryptography

  • Forecast new features and promising 4G packet-switched wireless internet technologies for voice and data communications

  • Provides MIMO/OFDMA-based for 4G systems such as Long Term Evolution (LTE), Ultra Mobile Broadband (UMB), Mobile WiMax or Wireless Broadband (WiBro)

  • Deals with Intrusion Detection System against worm/virus cyber attacks

The book ideal for advanced undergraduate and postgraduate students enrolled in courses such as Wireless Access Networking, Mobile Internet Radio Communications. Practicing engineers in industry and research scientists can use the book as a reference to get reacquainted with mobile radio fundamentals or to gain deeper understanding of complex security issues.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Preface
  5. About the Author
  6. Acknowledgments
  7. Chapter 1: Internetworking and Layered Models
    1. 1.1 Networking Technology
    2. 1.2 Connecting Devices
    3. 1.3 The OSI Model
    4. 1.4 TCP/IP Model
  8. Chapter 2: TCP/IP Suite and Internet Stack Protocols
    1. 2.1 Network Layer Protocols
    2. 2.2 Transport Layer Protocols
    3. 2.3 World Wide Web
    4. 2.4 File Transfer
    5. 2.5 E-Mail
    6. 2.6 Network Management Service
    7. 2.7 Converting IP Addresses
    8. 2.8 Routing Protocols
    9. 2.9 Remote System Programs
    10. 2.10 Social Networking Services
    11. 2.11 Smart IT Devices
    12. 2.12 Network Security Threats
    13. 2.13 Internet Security Threats
    14. 2.14 Computer Security Threats
  9. Chapter 3: Global Trend of Mobile Wireless Technology
    1. 3.1 1G Cellular Technology
    2. 3.2 2G Mobile Radio Technology
    3. 3.3 2.5G Mobile Radio Technology
    4. 3.4 3G Mobile Radio Technology (Situation and Status of 3G)
    5. 3.5 3G UMTS Security-Related Encryption Algorithm
  10. Chapter 4: Symmetric Block Ciphers
    1. 4.1 Data Encryption Standard (DES)
    2. 4.2 International Data Encryption Algorithm (IDEA)
    3. 4.3 RC5 Algorithm
    4. 4.4 RC6 Algorithm
    5. 4.5 AES (Rijndael) Algorithm
  11. Chapter 5: Hash Function, Message Digest, and Message Authentication Code
    1. 5.1 DMDC Algorithm
    2. 5.2 Advanced DMDC Algorithm
    3. 5.3 MD5 Message-Digest Algorithm
    4. 5.4 Secure Hash Algorithm (SHA-1)
    5. 5.5 Hashed Message Authentication Codes (HMAC)
  12. Chapter 6: Asymmetric Public-Key Cryptosystems
    1. 6.1 Diffie–Hellman Exponential Key Exchange
    2. 6.2 RSA Public-Key Cryptosystem
    3. 6.3 ElGamal's Public-Key Cryptosystem
    4. 6.4 Schnorr's Public-Key Cryptosystem
    5. 6.5 Digital Signature Algorithm
    6. 6.6 The Elliptic Curve Cryptosystem (ECC)
  13. Chapter 7: Public-Key Infrastructure
    1. 7.1 Internet Publications for Standards
    2. 7.2 Digital Signing Techniques
    3. 7.3 Functional Roles of PKI Entities
    4. 7.4 Key Elements for PKI Operations
    5. 7.5 X.509 Certificate Formats
    6. 7.6 Certificate Revocation List
    7. 7.7 Certification Path Validation
  14. Chapter 8: Network Layer Security
    1. 8.1 IPsec Protocol
    2. 8.2 IP Authentication Header
    3. 8.3 IP ESP
    4. 8.4 Key Management Protocol for IPsec
  15. Chapter 9: Transport Layer Security: SSLv3 and TLSv1
    1. 9.1 SSL Protocol
    2. 9.2 Cryptographic Computations
    3. 9.3 TLS Protocol
  16. Chapter 10: Electronic Mail Security: PGP, S/MIME
    1. 10.1 PGP
    2. 10.2 S/MIME
  17. Chapter 11: Internet Firewalls for Trusted Systems
    1. 11.1 Role of Firewalls
    2. 11.2 Firewall-Related Terminology
    3. 11.3 Types of Firewalls
    4. 11.4 Firewall Designs
    5. 11.5 IDS Against Cyber Attacks
    6. 11.6 Intrusion Detections Systems
  18. Chapter 12: SET for E-Commerce Transactions
    1. 12.1 Business Requirements for SET
    2. 12.2 SET System Participants
    3. 12.3 Cryptographic Operation Principles
    4. 12.4 Dual Signature and Signature Verification
    5. 12.5 Authentication and Message Integrity
    6. 12.6 Payment Processing
  19. Chapter 13: 4G Wireless Internet Communication Technology
    1. 13.1 Mobile WiMAX
    2. 13.2 WiBro (Wireless Broadband)
    3. 13.3 UMB (Ultra Mobile Broadband)
    4. 13.4 LTE (Long Term Evolution)
  20. Acronyms
  21. Bibliography
  22. Index