did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470723173

Cellular Authentication for Mobile and Internet Services

by ; ; ; ;
  • ISBN13:

    9780470723173

  • ISBN10:

    0470723173

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2008-11-03
  • Publisher: Wiley

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $113.01 Save up to $41.81
  • Rent Book $71.20
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-4 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

An invaluable reference discussing the Generic Authentication Architecture (GAA), its infrastructure, usage and integration into existing networksCellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure web browsing with a phone or PC, Single Sign-On (SSO), mobile broadcast content protection, secure location services, etc. The book discusses the Generic Authentication Architecture (GAA) of the mobile standardization body 3 rd Generation Partnership Project (3GPP) and its American counterpart 3GPP2 in full detail and with all variants. It explains the usage of GAA by various standardization bodies and standardized applications, and also looks at a number of non-standardized ones, such as secure remote login to enterprise environment and card personalization.Cellular Authentication for Mobile and Internet Services: Describes the usage of the generic authentication architecture (GAA) by various standardization bodies and standardized applications, covering mobile broadcast / multicast service security, Single Sign-On, HTTPS (i.e. secure web browsing), secure data access, secure location services, etc Provides guidance on how to integrate the generic authentication into existing and future terminals, networks and applications Explains the functionality of the application security in general as well as on application developer level Describes various business scenarios and related security solutions, and covers secure application implementation and integration Brings together essential information (currently scattered across different standardization bodies) on standards in one comprehensive volumeThis excellent all-in-one reference will provide system and protocol designers, application developers, senior software project managers, telecommunication managers and ISP managers with a sound introduction into the field of secure communication for mobile applications. System integrators, advanced students, Ph.D. candidates, and professors of computer science or telecommunications will also find this text very useful.

Author Biography

Silke Holtmanns, Nokia Research Center, Helsinki, Finland is a Researcher in?the at Nokia Research Center (NRC) Helsinki in the Trustworthy Communications and Identities Team of the Internet Core Technology Center. She joined NRC in 2004 in the?Mobile Computer Human-Interaction Competence Area and the Software and Applications Technology Lab. Prior to joining Nokia, she worked at Ericsson Research Department - Service Networks and Applications Technology.

Valtteri Niemi, Nokia Research Center, Helsinki, Finland is a Research Team Leader at NRC and a part-time professor at the University of Turku

Philip Ginzboorg, Nokia Research Center, Helsinki, Finland is a Principal Research Engineer at NRC.

Pekka Laitinen, Nokia Research Center, Helsinki, Finland is a Security Researcher at NRC.

N. Asokan, Helsinki Finland is a part-time Professor at the Helsinki University of Technology.

Table of Contents

Prefacep. ix
Acknowledgementsp. xi
Introductionp. 1
Authenticated Key Agreementp. 1
The Challenge in Authenticated Key Agreementp. 2
How to Read this Book?p. 5
Referencep. 6
Classical Approaches to Authentication and Key Agreementp. 7
Existing Mobile Security Solutionsp. 7
UMTS Security Infrastructurep. 7
Issues in Securing Services with Radio Layer Securityp. 14
General-Purpose Approaches to Authentication and Key Managementp. 16
Public Key Infrastructure (PKI)p. 16
Passwordsp. 18
Kerberosp. 19
Radio Layer and General Purpose Security Mechanismsp. 19
Requirements for GAAp. 20
Referencesp. 21
Generic Authentication Architecturep. 23
Overview of Generic Authentication Architecturep. 23
Rationales for Design Decisionsp. 23
A Bird's Eye View of GAAp. 25
Foundations of GAAp. 30
Architectural Elements of GAAp. 30
Bootstrappingp. 33
Authenticationp. 39
Variations of the Generic Bootstrapping Architecturep. 41
GBA_MEp. 42
GBA_Up. 42
2G GBAp. 47
Detection of Bootstrapping Variants by the NAFp. 48
3GPP2 GBAp. 54
Building Blocks of GAAp. 66
Introductionp. 66
PKI Portalp. 72
HTTPS Supportp. 74
Key Distribution Servicep. 74
Key Distribution for Terminal to Remote Device Usagep. 74
Key Distribution for UICC to Terminal Usagep. 77
Other Architectural Issuesp. 79
Access Control Mechanisms in GAAp. 79
Local Policy Enforcement in the BSFp. 80
USS usage for NAFsp. 81
Identities in GAAp. 82
Identity Privacy and Unlinkabilityp. 84
Usability and GAAp. 84
Split Terminalp. 84
Interoperator GAA: Using GAA Across Operator Boundariesp. 89
Security Considerations of GAAp. 91
Overview of 3GPP GAA Specificationsp. 96
Referencesp. 100
Applications Using Generic Authentication Architecturep. 105
Standardized Usage Scenariosp. 105
Authentication Using GAAp. 105
HTTP Digest Authenticationp. 107
Pre-Shared Key TLSp. 111
Proxy Mode Authenticationp. 112
Referrer Mode Authenticationp. 116
Broadcast Mobile TV Servicep. 119
Security Goalsp. 123
Service Architecturep. 123
Message Flow Examplep. 126
Tracing Source of Leaked Keysp. 130
Further Standardized Usage Scenariosp. 131
Additional Usage Scenariosp. 135
Secure Enterprise Loginp. 136
Personalization for Payments and Securing Public Transport Ticketsp. 138
Secure Messaging in Delay and Disruption-prone Environmentsp. 140
Terminal to Terminal Securityp. 141
Transitive Trust in IP Multimedia Subsystems (IMS)p. 144
Referencesp. 148
Guidance for Deploying GAAp. 153
Integration with Application Serversp. 153
Introductionp. 153
Username / Password Replacementp. 154
NAF Libraryp. 155
Apache Web Serverp. 156
J2EE Serversp. 157
Direct Usage of NAF Libraryp. 158
Web Services Direct Usagep. 159
Integration with OS Securityp. 159
Threats for GAA Implementations in Open Platform UEsp. 160
Access Control Requirementsp. 161
Basic Access Control in Practice: Integration in the Series 60 Platformp. 162
Extended Access Control: Design Optionsp. 163
Other Platformsp. 165
Integration with Identity Management Systemsp. 166
Introductionp. 166
GAA Interworking with Liberty ID-FFp. 167
Integration of GAA into Mobile Networksp. 170
Integration of HLR into GAAp. 170
Key Lifetime Setting in BSFp. 173
Usage of SIM Cards in GAA (2G GBA)p. 175
Charging and GAAp. 177
GAA Integration into Large Networksp. 178
Referencesp. 180
Future Trendsp. 183
Standardization Outlookp. 183
GBA Pushp. 183
GAA User Privacyp. 185
GAA in Evolved Packet Systems (EPSs) and Mobile IP (MIP)p. 187
Outlook for GAAp. 189
Referencesp. 192
Terminology and Abbreviationsp. 193
Indexp. 201
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program