Willkommen, schön sind Sie da!
Logo Ex Libris

LTE Security

  • E-Book (pdf)
  • 304 Seiten
(0) Erste Bewertung abgeben
Alle Bewertungen ansehen
Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows... Weiterlesen
E-Books ganz einfach mit der kostenlosen Ex Libris-Reader-App lesen. Hier erhalten Sie Ihren Download-Link.
CHF 81.00
Download steht sofort bereit
Informationen zu E-Books
E-Books eignen sich auch für mobile Geräte (sehen Sie dazu die Anleitungen).
E-Books von Ex Libris sind mit Adobe DRM kopiergeschützt: Erfahren Sie mehr.
Weitere Informationen finden Sie hier.


Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms employed to meet these requirements.

Whilst the industry standards inform how to implement systems, they do not provide readers with the underlying principles behind security specifications. LTE Security fills this gap by providing first hand information from 3GPP insiders who explain the rationale for design decisions.

Key features:

  • Provides a concise guide to the 3GPP/LTE Security Standardization specifications
  • Authors are leading experts who participated in decisively shaping SAE/LTE security in the relevant standardization body, 3GPP
  • Shows how GSM and 3G security was enhanced and extended to meet the requirements of fourth generation systems
  • Gives the rationale behind the standards specifications enabling readers to have a broader understanding of the context of these specifications
  • Explains why LTE security solutions are designed as they are and how theoretical security mechanisms can be put to practical use

Dan Forsberg received a M.Sc. degree in Computer Science (software engineering and telecommunications software) from the Helsinki University of Technology, Finland, in March 2000. He was a core member and developer of The Dynamics - HUT Mobile IP software. He worked in Nokia Research Center in Helsinki from 2000 to 2009. At Nokia Dan was involved in and led many research projects focused on mobility and security for future mobile devices. He was active in IETF and authored some Internet-Drafts and one standards track RFC in the area of user to network interfaces (EAP, AAA, PANA). In recent years, the main focus of his work has been on the SAE/LTE security standardization in the 3GPP security group (SA3). Dan led the SAE/LTE security standardization in Nokia from around 2005 to 2009. He was also nominated as one of the Nokia top inventors in 2007-2008. Dan began his PhD studies while working at Nokia and has published several scientific papers in the area of "improving and distributing session key management for mobile networks". He joined Helsinki University of Technology in 2009 to finalize his PhD studies. Dan is also a skilled software engineer, a Unix and network administration expert and established his own company in 2010 for consulting on security and software development.

Günther Horn received a PhD (Dr.rer.nat.) degree in Mathematics from the University of Tübingen, Germany, in 1985. He served as an Assistant Professor of Mathematics at the University of California at Irvine in 1985. He joined the Corporate Technology Labs of Siemens AG in Munich in 1986. In 2007, he joined Nokia Siemens Networks. He has been engaged in research on and standardization of new telecommunications systems, including security in mobile networks, fraud control, and mobile applications security. He has been active in many collaborative research projects sponsored by the European Union. In recent years, the focus of his work has been on the standardization of 3G security and SAE/LTE security in the 3GPP security group (SA3), of which he has been a member since it started in 1999. Before this, he contributed to ETSI SMG. He has published on communications security in conference proceedings, journals, and books.

Wolf-Dietrich Moeller studied Physics and Electrical Engineering in Berlin, Glasgow and Munich. With his research work on semiconductor device technology at Technische Universität München (TUM) he received his Dr.-Ing. degree in 1977. In the same year he joined the Corporate Technology Labs of Siemens AG in Munich. After leading a research group on microprocessor architectures and VLSI chip design from 1983 until 1993, in recent years his main subject has been research in security for mobile communications, device integrity and security hardware. He has been active in European and German collaborative research projects, and contributes to the standardisation of mobile security in 3GPP. Since 2007 he has worked at Nokia Siemens Networks Research and Technology Labs in research, standardisation and systems engineering for fixed and mobile networks. Recently he contributed to the book Selected Topics in Communication Networks and Distributed Systems (forthcoming).

Valtteri Niemi received a PhD degree in Mathematics from the University of Turku, Finland in 1989. After serving in various positions at University of Turku, he became an Associate Professor in Mathematics at the University of Vaasa, Finland, during 1993-97. He joined Nokia Research Center (NRC), Helsinki in 1997 where he has contributed in several roles for Nokia research in the wireless security area, including cryptological aspects. In 2008, he moved to the new NRC laboratory in Lausanne, Switzerland, where his main focus is on privacy-enhancing technologies. He was nominated as a Nokia Fellow in January 2009. He has participated to the 3GPP SA3 (security) standardization group from the beginning. During 2003-2009 he was the chairman of the group.
Before 3GPP, Niemi took part in ETSI SMG 10 for GSM security work. He has published more than 40 scientific articles and he is a co-author of three books.



1 Overview of the Book.

2 Background.

2.1 Evolution of Cellular Systems.

2.2 Basic Security Concepts.

2.3 Basic Cryptographic Concepts.

2.4 Introduction to LTE Standardization.

2.5 Notes on Terminology and Specification Language.

3 GSM Security.

3.1 Principles of GSM Security.

3.2 The Role of the SIM.

3.4 GSM Cryptographic Algorithms.

4 Third-generation Security (UMTS).

4.1 Principles of Third-generation Security.

4.2 Third-generation Security Mechanisms.

4.3 Third-generation Cryptographic Algorithms.

4.4 Interworking between GSM and 3G security.

4.5 Network Domain Security.

5 3GWLAN Interworking.

5.1 Principles of 3GWLAN Interworking.

5.2 Security Mechanisms of 3GWLAN Interworking.

5.3 Cryptographic Algorithms for 3GWLAN Interworking.

6 EPS Security Architecture.

6.1 Overview and Relevant Specifications.

6.2 Requirements and Features of EPS Security.

6.3 Design Decisions for EPS Security.

6.4 Platform Security for Base Stations.

7 EPS Authentication and Key Agreement.

7.1 Identification.

7.2 The EPS Authentication and Key Agreement Procedure.

7.3 Key Hierarchy.

7.4 Security Contexts.

8 EPS Protection for Signalling and User Data.

8.1 Security Algorithms Negotiation.

8.2 NAS Signalling Protection.

8.3 AS Signalling and User Data Protection.

8.4 Security on Network Interfaces.

8.5 Certificate Enrolment for Base Stations.

8.6 Emergency Call Handling.

9 Security in Intra-LTE State Transitions and Mobility.

9.1 Transitions to and from Registered State.

9.2 Transitions Between Idle and Connected States 149

9.3 Idle State Mobility.

9.4 Handover.

9.5 Key Change on the Fly.

9.6 Periodic Local Authentication Procedure.

9.7 Concurrent Run of Security Procedures.

10 EPS Cryptographic Algorithms.

10.1 Null Algorithms.

10.2 Ciphering Algorithms.

10.3 Integrity Algorithms.

10.4 Key Derivation Algorithms.

11 Interworking Security Between EPS and Other Systems.

11.1 Interworking with GSM and 3G Networks.

11.2 Interworking with Non-3GPP Networks.

12 Security for Voice over LTE.

12.1 Methods for Providing Voice over LTE.

12.2 Security Mechanisms for Voice over LTE.

13 Security for Home Base Station Deployment.

13.1 Security Architecture, Threats and Requirements.

13.2 Security Features.

13.3 Security Procedures Internal to the Home Base Station.

13.4 Security Procedures between Home Base Station and Security Gateway.

13.5 Security Aspects of Home Base Station Management.

13.6 Closed Subscriber Groups and Emergency Call Handling.

14 Future Challenges.

14.1 Near-term Outlook.

14.2 Far-term Outlook.





Titel: LTE Security
EAN: 9780470973288
ISBN: 978-0-470-97328-8
Digitaler Kopierschutz: Adobe-DRM
Format: E-Book (pdf)
Herausgeber: Wiley-Interscience
Genre: Elektronik, Elektrotechnik, Nachrichtentechnik
Anzahl Seiten: 304
Veröffentlichung: 07.09.2010
Jahr: 2010
Untertitel: Englisch
Dateigrösse: 3.1 MB