Artech House is pleased to offer you this title in a special In-Print-Forever® ( IPF® ) hardbound edition. This book is not available from inventory but can be printed at your request and delivered within 2-4 weeks of receipt of order. Please note that because IPF® books are printed on demand, returns cannot be accepted.
Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers you a broad overview of wireless security, so you can choose the methods and techniques that are most appropriate for your projects. You gain a solid understanding of critical cryptography techniques, such as private/public key encryption, digital signatures, and block and stream ciphers. You discover how to evaluate cryptography deployment impact on current wireless network architectures, and learn how to implement an effective cryptography architecture for any organization. The book offers the technical know-how you need to understand and work with the security concepts and techniques used for 2nd, 3rd, and 4th generation mobile networks. Moreover, this highly practical reference shows you how to implement an authentication technique that helps the user roam in different networks while maintaining the role symmetry of the message structure in intra domain and inter domain environments. Additionally, the book discusses the wireless application protocol (WAP), explaining how the protocol works and how to select appropriate cryptographic modules for this technology.
Table Of Contents
Introduction - Roadmap to the Book. What Type of Book Is This? Terminology. Notations. Cryptography - What is Cryptography? Types of Cryptography. Secret Key Cryptography. Pubic Key Cryptography. ; Security Features in Wireless - General Security Considerations in a Network. Mobile Environment. Limitations of Mobile Environment. Mobility and Security.; Authentication/Authorization/Accounting - Authentication in Mobile Communications. Anonymity. Billing System Architecture.; Security in GSM -Introduction. Security Features. Security Architecture.; Security in 3G Systems and 4G Systems - Security BUGs in 2G System. Added Security Features in 3G Systems.; PKI in Wireless (WPKI) -Introduction of PKI. Characteristics of WPKI. WPKI Technology Specifications.; Wireless Application Protocol (WAP) ëIntroduction. WAP Architecture. WAP Security.; Bibliography. Glossary. Index.;