Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 288 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
288
Dung lượng
2,94 MB
Nội dung
[...]... wireless communications system, is called security technology This book is a description of the security solutions specified for the Universal Mobile Telecommunication System (UMTS) It gives a comprehensive presentation of UMTSsecurity specifications and explains the role of the security functionality in UMTS In the first place, this book is aimed at presenting the UMTSsecurity system in its totality to planners,... aspects Lawful interception; Stage 1 Security- related network functions Lawful interception; Stage 2 Access domain security 3G security; access security for IP-based services 3G security; NDS; IP network layer security Guide to 3G security 3G security; handover interface for lawful interception 3G security; NDS/AF; feasibility study to support NDS/IP evolution Specification of the GSM MILENAGE algorithms:... comprise the UMTSsecurity system While the parts can be read independently, we feel by including them in one book that the reader has the chance to become familiar with the delicate interplay between security and cryptography This book presents the results of the extensive, demanding and strenuous work of security expert teams and individuals who together created the specifications of UMTSsecurity It... organization In particular, no part of the material contained in this book should be used as a 3GPP or IETF specification Part I Security Architecture for UMTS 1 Introduction to Security and to UMTS 1.1 Security in Telecommunications The wireline communication network has certain inherent security properties: the network operator has basically installed the whole network including lines all the way to the socket... between physical security and information security (e.g., fingerprint checking assumes both sophisticated measurement instruments and sophisticated information system to support the use of these instruments as access control devices) In the future, biometrics is likely to become an increasingly important component of security systems Introduction to Security and to UMTS 5 1.1.1.1 Communication security In... requirements are changing while the security design work is ongoing However, it is important that the security for the system is designed at the same time as the system itself is designed Trying to add security to an existing complete system typically leads to impractical and inefficient solutions 1.1.2 GSM security The goal of the security design for the GSM was clear: the security has to be as good as that... description; Stage 2 IST; Stage 2 3G security; security architecture 3G security; integration guidelines Cryptographic algorithm requirements Lawful interception requirements 3G security; lawful interception architecture and functions Security objectives and principles Criteria for cryptographic algorithm design process Formal analysis of the 3G authentication protocol 3G security; general report on the... planners, builders and implementers of UMTS networks It also gives a unified treatment of the security services provided by UMTS that we expect will be invaluable to developers and analysts of application-oriented security services that make use of UMTS communication networks This book could also serve as a textbook for an advanced university course in modern communication security technology To achieve global... we concentrate on those aspects of telecommunication security that belong to the broad category of information security More specifically, we deal with communication security Another division of information security can be derived from a conceptual point of view The following areas can be studied fairly independently of each other: 1 System-level security Here the leading principle is ‘‘the system is... are often easier to do 2 Application security For instance, banking applications over the Internet typically use security mechanisms that are tailored to meet their specific requirements 3 Protocol-level security This is about how communicating parties can achieve security goals by executing well-defined communication steps in a predefined order 4 Operating system security The behaviour of all elements . production. Contents Preface xi PART I: SECURITY ARCHITECTURE FOR UMTS 1 1 Introduction to Security and to UMTS 3 1.1 Security in Telecommunications 3 1.1.1 General security principles 4 1.1.2 GSM security 7 1.2 The. specification. Part I Security Architecture for UMTS 1 Introduction to Security and to UMTS 1.1 Security in Telecommunications The wireline communication network has certain inherent security properties:. of security systems. 4 UMTS Security 1.1.1.1 Communication security In this book we concentrate on those aspects of telecommunication security that belong to the broad category of information security.