Wireless Communications Security: Solutions for the Internet of Things

Wireless Communications Security: Solutions for the Internet of Things

Penttinen, Jyrki T. J.

102,13 €(IVA inc.)

INDICE: Author bio .Preface .Acknowledgments .Abbreviations .1 Introduction .1.1 Introduction .1.2 Wireless security .1.2.1 Background and advances .1.2.2 Statistics .1.2.3 Wireless threats .1.2.4 M2M environment .1.3 Standardization .1.3.1 OMA .1.3.2 International Organization for Standardization .1.3.3 ITU .1.3.4 ETSI .1.3.5 IEEE .1.3.6 IETF .1.3.7 3GPP .1.3.8 3GPP2 .1.3.9 GlobalPlatform .1.3.10 SIMalliance .1.3.11 Smart Card Alliance .1.3.12 GSMA .1.3.13 NIST .1.3.14 NHTSA .1.3.15 Other Standardization and Industry Forums .1.3.16 EMVCo .1.3.17 PC/SC .1.3.18 HIPAA .1.3.19 Common Criteria .1.3.20 EAL .1.3.21 FIPS .1.3.22 Biometric Standards .1.3.23 Other related entities .1.4 Wireless Security Principles .1.4.1 General .1.4.2 Regulation .1.4.3 Security architectures .1.4.4 Algorithms and security principles .1.5 Focus and contents of the book .2 Security of Wireless Systems .2.1 Overview .2.1.1 Overall security considerations in mobile environment .2.1.2 Developing security threats .2.1.3 RF interferences and safety .2.2 Effects of broadband mobile data .2.2.1 Background .2.2.2 The role of networks .2.2.3 The role of apps .2.2.4 UE application development .2.2.5 Developers .2.2.6 The role of SIM/UICC .2.2.7 Challenges of legislation .2.2.8 Updating standards .2.2.9 3GPP system evolution .2.3 GSM .2.3.1 SIM .2.3.2 Authentication and authorization .2.3.3 Encryption of the radio interface .2.3.4 Encryption of IMSI .2.3.5 Other GSM security aspects .2.4 UMTS/HSPA .2.4.1 Principles of 3G security .2.4.2 Key utilization .2.4.3 3G security procedures .2.5 LTE .2.5.1 Protection and security principles .2.5.2 X.509 certificates and PKI .2.5.3 IPsec and IKE for LTE transport security .2.5.4 Traffic Filtering .2.5.5 LTE radio interface security .2.5.6 Authentication and authorization .2.5.7 LTE/SAE service security case examples .2.5.8 MBMS and eMBMS .2.6 Security aspects of other networks .2.6.1 CDMA (IS–95) .2.6.2 CDMA2000 .2.6.3 Broadcast Systems .2.6.4 Satellite Systems .2.6.5 TETRA .2.6.6 Wireless LAN .2.7 Interoperability .2.7.1 Simultaneous support for LTE/SAE and 2G/3G .2.7.2 VoLTE .2.7.3 CS Fallback .2.7.4 Inter–operator security aspects .2.7.5 Wi–Fi networks and Offload .2.7.6 Femtocell architecture .3 Internet of Things .3.1 Overview .3.2 Foundation .3.2.1 Definitions .3.2.2 Security considerations of IoT .3.2.3 The role of IoT .3.2.4 IoT environment .3.2.5 IoT market .3.2.6 Connectivity .3.2.7 Regulation .3.2.8 Security risks .3.2.9 Cloud .3.2.10 Cellular connectivity .3.2.11 WLANs .3.2.12 Low–range systems .3.3 Development of IoT .3.3.1 GSMA Connected Living .3.3.2 Global Platform .3.3.3 Other industry forums .3.4 Technical Description of IoT .3.4.1 General .3.4.2 Secure communication channels and interfaces .3.4.3 Provisioning and key derivation .3.4.4 Use cases .4 Smart Cards and Secure Elements .4.1 Overview .4.2 Role of smart cards and secure elements .4.3 Contact–Cards .4.3.1 ISO/IEC 7816–1 .4.3.2 ISO/IEC 7816–2 .4.3.3 ISO/IEC 7816–3 .4.3.4 ISO/IEC 7816–4 .4.3.5 ISO/IEC 7816–5 .4.3.6 ISO/IEC 7816–6 .4.3.7 ISO/IEC 7816–7 .4.3.8 ISO/IEC 7816–8 .4.3.9 ISO/IEC 7816–9 .4.3.10 ISO/IEC 7816–10 .4.3.11 ISO/IEC 7816–11 .4.3.12 ISO/IEC 7816–12 .4.3.13 ISO/IEC 7816–13 .4.3.14 ISO/IEC 7816–15 .4.4 SIM/UICC .4.4.1 Terminology .4.4.2 Principle .4.4.3 Key standards .4.4.4 Form Factors .4.5 Contents of Subscriber Identity Module .4.5.1 UICC building blocks .4.5.2 SIM Application Toolkit .4.5.3 Contents of UICC .4.6 Embedded secure elements .4.6.1 Principle .4.6.2 M2M Subscription management .4.6.3 Personalization .4.6.4 M2M SIM types .4.7 Other card types .4.7.1 Access cards .4.7.2 External SD Cards .4.8 Contactless Cards .4.8.1 ISO/IEC standards .4.8.2 NFC .4.9 Electro–mechanical characteristics of smart cards .4.9.1 HW blocks .4.9.2 Memory .4.9.3 Environmental classes .4.10 SW of Smart Card .4.10.1 File structure .4.10.2 Card commands .4.10.3 Java Card .4.11 Communication of UICC .4.11.1 Card communications .4.11.2 Remote file management .5 Wireless Payment and Access Systems .5.1 Overview .5.2 Wireless connectivity as a base for payment and access .5.2.1 Barcodes .5.2.2 RFID .5.2.3 NFC .5.2.4 Secure element .5.2.5 Tokenization .5.3 E–commerce .5.3.1 EMV .5.3.2 Google Wallet .5.3.3 Visa .5.3.4 American Express .5.3.5 Square .5.3.6 Other bank initiatives .5.3.7 Apple Pay .5.3.8 Samsung Pay .5.3.9 MCX .5.3.10 Comparison of wallet solutions .5.4 Transport .5.4.1 MiFare .5.4.2 CiPurse .5.4.3 Calypso .5.4.4 FeliCa .5.5 Other secure systems .5.5.1 Mobile ID .5.5.2 PIV .5.5.3 Access Systems .6 Wireless Security Platforms and Functionality .6.1 Overview .6.2 Forming the base .6.2.1 Secure service platforms .6.2.2 Secure Elements .6.3 Remote subscription management .6.3.1 SIM as a basis for OTA .6.3.2 TSM .6.3.3 TEE .6.3.4 HCE and cloud .6.3.5 Comparison .6.4 Tokenization .6.4.1 PAN protection .6.4.2 HCE and tokenization .6.5 Other Solutions .6.5.1 Identity solutions .6.5.2 Multi–operator environment .7 Mobile Subscription Management .7.1 Overview .7.2 Subscription Management .7.2.1 Development up to day .7.2.2 Benefits and challenges of subscription management .7.3 OTA Platforms .7.3.1 General .7.3.2 Provisioning procedure .7.3.3 SMS–based SIM OTA .7.3.4 HTTPS–based SIM OTA .7.3.5 Commercial examples of SIM OTA solutions .7.4 Evolved Subscription Management .7.4.1 GlobalPlatform .7.4.2 SIMalliance .7.4.3 OMA .7.4.4 GSMA .8 Security Risks in Wireless Environment .8.1 Overview .8.2 Wireless attack types .8.2.1 Cyber attacks .8.2.2 Radio jammers and RF attacks .8.2.3 Attacks against secure element .8.2.4 IP breaches .8.2.5 UICC module .8.3 Security flaws on mobile networks .8.3.1 Potential security weaknesses of GSM .8.3.2 Potential security weaknesses of 3G .8.4 Protection methods .8.4.1 LTE security .8.4.2 Network attack types in LTE/SAE .8.4.3 Preparation for the attacks .8.5 Errors in equipment manufacturing .8.5.1 Equipment ordering .8.5.2 Early testing .8.6 Self–Organizing Network techniques for test and measurement .8.6.1 Principle .8.6.2 Self–Configuration .8.6.3 Self–Optimizing .8.6.4 Self–Healing .8.6.5 Technical issues and impact on network planning .8.6.6 Effects on network installation, commissioning and optimization .8.6.7 SON and security .9 Monitoring and Protection Techniques .9.1 Overview .9.2 Personal devices .9.2.1 Wi–Fi connectivity .9.2.2 Firewalls .9.3 IP core protection techniques .9.3.1 General principles .9.3.2 LTE packet core protection .9.3.3 Protection against roaming threats .9.4 HW fault and performance monitoring .9.4.1 Network monitoring .9.4.2 Protection against DoS/DDoS .9.4.3 Memory wearing .9.5 Security Analysis .9.5.1 Post–processing .9.5.2 Real–time security analysis .9.6 Virus Protection .9.7 Legal Interception .9.8 Personal safety and privacy .9.8.1 CMAS .9.8.2 Location privacy .9.8.3 Bio–effects .10 Future of Wireless Solutions and Security .10.1 Overview .10.2 IoT as a driving force .10.3 Evolution of 4G .10.4 Development of devices .10.4.1 Security aspects of Smart Cards .10.4.2 Mobile device considerations .10.4.3 IoT device considerations .10.4.4 Sensor networks and Big Data .10.5 5G Mobile Communications .10.5.1 Standardization .10.5.2 Concept .10.5.3 Industry and investigation initiatives .10.5.4 Role of 5G in IoT .Index

  • ISBN: 978-1-119-08439-6
  • Editorial: Wiley–Blackwell
  • Encuadernacion: Cartoné
  • Páginas: 336
  • Fecha Publicación: 11/11/2016
  • Nº Volúmenes: 1
  • Idioma: Inglés