Kranakis et al., 2008 - Google Patents
Mobile and wireless communications security1Kranakis et al., 2008
- Document ID
- 7153253205260935920
- Author
- Kranakis E
- Haroutunian E
- Shahbazian E
- Publication year
- Publication venue
- Aspects of Network and Information Security
External Links
Snippet
This article presents an overview of security issues for mobile and wireless communications. It describes the security requirements and architectural options for these networks. Subsequently, three technologies are discussed in more detail: mobile phones (GSM and …
- 238000004891 communication 0 title abstract description 35
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2033479B1 (en) | Method and apparatus for security protection of an original user identity in an initial signaling message | |
Shin et al. | Wireless network security and interworking | |
Cattaneo et al. | Security Issues and Attacks on the GSM Standard: a Review. | |
Chen et al. | Wireless network security | |
Parne et al. | PPSE: Privacy preservation and security efficient AKA protocol for 5G communication networks | |
Rose et al. | Access security in CDMA2000, including a comparison with UMTS access security | |
Lackner | A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX. | |
Maccari et al. | Security analysis of IEEE 802.16 | |
Hall | Detection of rogue devices in wireless networks | |
Bogdanoski et al. | IEEE 802.16 security issues: a survey | |
Farhat et al. | Private identification, authentication and key agreement protocol with security mode setup | |
Trimintzios et al. | WiFi and WiMAX secure deployments | |
Caragata et al. | Security of mobile Internet access with UMTS/HSDPA/LTE | |
Korkusuz | Security in the GSM Network | |
Sher et al. | Network access security management (NASM) model for next generation mobile telecommunication networks | |
Preneel | Mobile and wireless communications security | |
Kranakis et al. | Mobile and wireless communications security1 | |
Njoroge et al. | A survey of cryptographic methods in mobile network technologies from 1G to 4G | |
Aminmoghadam et al. | A forward secure PKI-based UMTS-AKA with tunneling authentication | |
Manos | Security and Privacy in the Air interface of cellular networks | |
Pervaiz et al. | Security in wireless local area networks | |
van Oorschot et al. | Wireless lan security: 802.11 and wi-fi | |
Banescu et al. | Security of 3G and LTE | |
Ahmed Kazi et al. | End-to-End Security for Connected Vehicles | |
Chaudhary et al. | Vulnerability Analysis of WPA Security Protocols |