did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470823361

Mobile Communication Systems and Security

by
  • ISBN13:

    9780470823361

  • ISBN10:

    0470823364

  • Format: Hardcover
  • Copyright: 2009-04-06
  • Publisher: Wiley-IEEE Press
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $176.75
We're Sorry.
No Options Available at This Time.

Summary

Arms readers with a well-rounded understanding of all major cellular air-interface technologies and their security layer techniquesMobile Radio Communications and Wireless Security covers technological development of wireless mobile communications in compliance with each iterative generation over the past decade. It presents the evolution and migration starting from 2G mobile radio technologies to 3G and beyond systems, largely covering packet-switched voice and data communications, with an emphasis on security layer protocols. Topics include GSM and cdmaOne IS-95A (2G), GPRS (2.5G), UMTS along with WCDMA (3G), CDMA2000 1xEV-DO (3G), CDMA2000 1xEV-DV (3G), HSDPA (3.5G), OFDM Radio Access technology (3.5G), AES and Elliptic Curve Cryptograph, Hash Function and Message Digest, HMAC, Data Expansion Technique by P-hash (secret, seed), Pseudo-random Function for Key generation. Delves into each iterative generation of cellular technology Provides an intimate understanding of security protocol layer techniques Written by a top expert in information security Presents numerical examples in each chapter for easier understanding Comes with code that can be used for individual practice Lecture notes available for instructor use

Author Biography

ManYoung Rhee is an Endowed Chair Professor atKyung Hee University and has over 45 years of research and teaching experience in the field of communication technologies, coding theory, cryptography, and information security. His career in academia includes professorships at Hanyang University (he also held the position of Vice President at this university), Virginia Tech, Seoul National University, and the University of Tokyo. Dr Rhee has held a number of high level positions in both government and corporate sectors: President of Samsung Semiconductor Communications; President of Korea Telecommunications Company; Chairman of the Korea Information Security Agency at the Ministry of Information and Communication; President of the Korea Institute of Information Security and Cryptology; and Vice President of the Agency for Defense Development at the Ministry of National Defense. He is a Member of the National Academy of Sciences, Senior Fellowat theKorea Academy of Science and Technology, and an Honorary Member of the National Academy of Engineering of Korea. His awards include the ‘‘Dongbaek’’ Order of National Service Merit and the "Mugunghwa" Order of National Service Merit, the highest grade honor for a scientist inKorea,NASPrize, the National Academy of Sciences, NAEK Grand Prize, the National Academy of Engineering of Korea, and Information Security Grand Prize, KIISC. He has also published the following four books: Coding, Cryptography, and Mobile Communications: Internet Security, John Wiley, 2003; CDMA Cellular Mobile Communications and Network Security, Prentice Hall, 1998; Cryptography and Secure Communications, McGraw-Hill, 1994; and Error Correcting Coding Theory, McGraw-Hill, 1989. Dr Rhee has a B.S. in Electrical Engineering from Seoul National University, and an M.S. in Electrical Engineering and a Ph.D. from the University of Colorado.

Table of Contents

Global System for Mobile Communications
GSM Bandwidth Allocation
GSM System Architecture
GSM Transmission Network Architecture
Signalling Channels on the Air Interface
GSM Security Architecture
cdma One IS-95A Technology
Reverse CDMA Channel
Reverse Traffic Channel
Access Channel
Multiplex Option 1 Information
Multiplex Option 2 Information
Forward CDMA Channel
Pilot Channel
Sync Channel
Paging Channel
Forward Traffic Channel
General Packet Radio Service (GPRS)
GPRS System Architecture
GPRS Logical Functions
Layered Protocol Architecture of Transmission Plane
GPRS Ciphering Algorithm
Third Generation Partnership Projects
3G Partnership Projects
Evolution of Mobile Radio Technologies
Cryptographic Protocols Applicable to Wireless Security Technologies
Universal Mobile Telecommunication System
UMTS Standardization
FDD/TDD modes for UTRA Operation
UMTS Architecture
UTRAN Architecture
UTRAN Terrestrial Interface
UTRAN-CN Interface via Iu
UMTS Security Related Features
UTRAN Overall Functions
UTRAN Iub Interface Protocol Structure
High Speed Downlink Packet Access (HSDPA)
Basic Structure of HS-DSCH
Overview of HSDPA Enhancement Technologies
HS-DSCH MAC Architecture - UE side
HS-DSCH MAC Architecture-UTRAN side
Overview of HSDPA Techniques to Support UTRA
Orthogonal Frequency Division Multiplexing (OFDM)
Prospect of OFDM-based Applications
CDMA 2000 1x High Rate Packet Data System (1xEV-DO)
Architectural Reference Protocol Model
Air Interface Layering Protocol
Stream Layer Protocol
Session Layer Protocol
Connection Layer Protocol
Security Layer Protocols
MAC Layer Protocols
Physical Layer Protocol
CDMA2000 1x Evolution-Data and Voice (1x EV-DV)
UMTS (WCDMA) versus CDMA2000 - Physical Layer Harmonization
Reverse CDMA Channel
Forward CDMA Channel
CDMA 2000 Entities and Service Interfaces
Advanced Encryption Standard and Elliptic Curve Cryptosystems
Advanced Encryption Standard (AES)
Elliptic Curve Cryptosystem (ECC)
Elliptic Curve Cryptosystem versus Public-key Cryptosystems
Hash Function, Message Authentication Code and Data Expansion Function
MD5 Message-Digest Algorithm
Secure Hash Algorithm (SHA-1)
Hashed Message Authentication Codes (HMAC)
Data Expansion Function
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program