Skip to Content
From GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband
book

From GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband

by Martin Sauter
March 2011
Intermediate to advanced
450 pages
18h 25m
English
Wiley
Content preview from From GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband

5.8 Security

As with all other technologies discussed in this book, security is of primary importance for 802.16 systems. Network operators require protection against fraudulent use and users need security measures to prevent third parties from using their subscription and generating costs for services they did not use. Furthermore, security mechanisms also have to ensure that the user's data cannot be intercepted and decoded by anyone but the network and the user, by listening on the air interface. Similar to other wireless systems, security is achieved by user authentication during the network entry procedure and on a periodical basis for the duration of the connection. To protect transmitted data, encryption is used with an individual ciphering key per user. Methods to protect users against other users of the network who might try to hack into their systems is, as in other wireless systems, not specified and left to the network operator or the users.

5.8.1 Authentication

Contrary to other wireless systems, 802.16 uses public key authentication and cryptography to validate the credentials of a SS. The method works as follows: Each subscriber station is assigned a private and a public key by the manufacturer. The subscriber's public key is known to the network, while the private key remains secret and is never transmitted over the air interface. Data encrypted with the public key can only be decrypted with the private key. It is not possible to encrypt data with the public key ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

LTE, LTE-Advanced and WiMAX: Towards IMT-Advanced Networks

LTE, LTE-Advanced and WiMAX: Towards IMT-Advanced Networks

Abd-Elhamid M. Taha, Hossam S. Hassanein, Najah Abu Ali
4G: LTE/LTE-Advanced for Mobile Broadband, 2nd Edition

4G: LTE/LTE-Advanced for Mobile Broadband, 2nd Edition

Erik Dahlman, Stefan Parkvall, Johan Skold

Publisher Resources

ISBN: 9780470978221Purchase book