RIVER PUBLISHERS IS AN INTERNATIONAL PUBLISHER THAT PUBLISHES RESEARCH MONOGRAPHS, PROFESSIONAL BOOKS, HANDBOOKS, EDITED VOLUMES AND JOURNALS WITH FOCUS ON KEY RESEARCH AREAS WITHIN THE FIELDS OF SCIENCE, TECHNOLOGY AND MEDICINE (STM).

River Publishers Series in Standardisation Series Read Description

Entity Authentication and Personal Privacy in Future Cellular Systems

Hardback
October 2009
9788792329325
More details
  • Publisher
    River Publishers
  • Published
    19th October 2009
  • ISBN 9788792329325
  • Language English
  • Pages 268 pp.
  • Size 6.125" x 9.25"
$110.00

There are currently more than four billion cellular subscribers in the world, and this number is constantly growing. With this in mind, it should be clear that the use of mobile communication has already become a pervasive and ubiquitous global commodity.

Entity Authentication and Personal Privacy in Future Cellular Systems explains and examines access security as it is found in mobile/cellular systems. It conducts a thorough investigation of how access security and personal privacy is handled in the 3GPP system. This includes both the 2G systems GSM/GPRS and the 3G system UMTS. The emerging fourth generation LTE architecture is also examined.

The first part of the book deals exclusively with presenting access security as found in the 3GPP system. Particular attention is given to the authentication and key agreement procedures. The 3GPP systems have evolved, and the access security architecture in LTE is substantially more advanced and mature than what you would find in GSM/GPRS, but even the LTE security architecture has its limitations.

Part two of the book examines what is missing from the current cellular access security architectures. Some of the shortcomings found in GSM/GPRS and later UMTS have been partially addressed in LTE, but the burden of backwards compatibility has meant that many issues could not be easily resolved. Free from those restrictions, we shall see that one can provide substantially improved subscriber privacy and enhanced entity authentication while avoiding the delegated authentication control that all 3GPP systems have.

The design of authentication protocols is discussed in depth. This would also include looking into the role of formal verification in the design of security protocols.

Geir M. Koien

No information