Communication System SecurityHelping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design.Divided into four parts, the book begins w |
Contents
1 | |
15 | |
II Security Mechanisms and Protocols | 221 |
III Wireless Security | 323 |
IV System Security | 535 |
APPENDICES | 697 |
Other editions - View all
Common terms and phrases
3GPP AAA protocols access authentication access server algorithm applied assume attacks authentication key authentication protocol authentication server binary bits block cipher boolean function called certificate ciphersuite ciphertext codeword Communication System Security cryptographic decoder decryption defined digital signature domain EAP method EAP-AKA encryption entity example filtering handover hash function hash value header hopping IEEE IETF initial integrity protection IP packet IPsec IPv4 jammer jamming key establishment key stream layer LFSR linear span m-sequence message authentication code Mobile IPv4 mobile node mode modulation multicast multiple mutual authentication NLFSR pair parameters party password payload plaintext PN sequence polynomial pre-shared private key protected communications PRSG pseudorandom public key RADIUS re-authentication receiver S-box scheme secrecy sends sequence number session keys signal specific spread-spectrum spreading sequences stream cipher symmetric key transmitted trusted platform tunnel UMTS update vector verify wireless wiretap channel