O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Wireless Communications Security

Table of Contents

  1. Cover
  2. Title Page
  3. About the Author
  4. Preface
  5. Acknowledgements
  6. Abbreviations
  7. 1 Introduction
    1. 1.1 Introduction
    2. 1.2 Wireless Security
    3. 1.3 Standardization
    4. 1.4 Wireless Security Principles
    5. 1.5 Focus and Contents of the Book
    6. References
  8. 2 Security of Wireless Systems
    1. 2.1 Overview
    2. 2.2 Effects of Broadband Mobile Data
    3. 2.3 GSM
    4. 2.4 UMTS/HSPA
    5. 2.5 Long Term Evolution
    6. 2.6 Security Aspects of Other Networks
    7. 2.7 Interoperability
    8. References
  9. 3 Internet of Things
    1. 3.1 Overview
    2. 3.2 Foundation
    3. 3.3 Development of IoT
    4. 3.4 Technical Description of IoT
    5. References
  10. 4 Smartcards and Secure Elements
    1. 4.1 Overview
    2. 4.2 Role of Smartcards and SEs
    3. 4.3 Contact Cards
    4. 4.4 The SIM/UICC
    5. 4.5 Contents of the SIM
    6. 4.6 Embedded SEs
    7. 4.7 Other Card Types
    8. 4.8 Contactless Cards
    9. 4.9 Electromechanical Characteristics of Smartcards
    10. 4.10 Smartcard SW
    11. 4.11 UICC Communications
    12. References
  11. 5 Wireless Payment and Access Systems
    1. 5.1 Overview
    2. 5.2 Wireless Connectivity as a Base for Payment and Access
    3. 5.3 E‐commerce
    4. 5.4 Transport
    5. 5.5 Other Secure Systems
    6. References
  12. 6 Wireless Security Platforms and Functionality
    1. 6.1 Overview
    2. 6.2 Forming the Base
    3. 6.3 Remote Subscription Management
    4. 6.4 Tokenization
    5. 6.5 Other Solutions
    6. References
  13. 7 Mobile Subscription Management
    1. 7.1 Overview
    2. 7.2 Subscription Management
    3. 7.3 OTA Platforms
    4. 7.4 Evolved Subscription Management
    5. References
  14. 8 Security Risks in the Wireless Environment
    1. 8.1 Overview
    2. 8.2 Wireless Attack Types
    3. 8.3 Security Flaws on Mobile Networks
    4. 8.4 Protection Methods
    5. 8.5 Errors in Equipment Manufacturing
    6. 8.6 Self‐Organizing Network Techniques for Test and Measurement
    7. References
  15. 9 Monitoring and Protection Techniques
    1. 9.1 Overview
    2. 9.2 Personal Devices
    3. 9.3 IP Core Protection Techniques
    4. 9.4 HW Fault and Performance Monitoring
    5. 9.5 Security Analysis
    6. 9.6 Virus Protection
    7. 9.7 Legal Interception
    8. 9.8 Personal Safety and Privacy
    9. References
  16. 10 Future of Wireless Solutions and Security
    1. 10.1 Overview
    2. 10.2 IoT as a Driving Force
    3. 10.3 Evolution of 4G
    4. 10.4 Development of Devices
    5. 10.5 5G Mobile Communications
    6. References
  17. Index
  18. End User License Agreement