文件名称:UMTS Security
文件大小:2.94MB
文件格式:PDF
更新时间:2012-04-19 20:05:12
UMTS
Physical communication channels in wireless technology are inherently insecure. As a wire only has two ends, the wired communication technology has a means of supporting integrity of communication, whereas in wireless communication dedicated technology is needed—even to control a basic point-to-point connection. This technology of communication integrity, which forms an essential part of any modern wireless communications system, is called security technology. This book is a description of the security solutions specified for the Universal Mobile Telecommunication System (UMTS). It gives a comprehensive presentation of UMTS security specifications and explains the role of the security functionality in UMTS. In the first place, this book is aimed at presenting the UMTS security system in its totality to planners, builders and implementers of UMTS networks. It also gives a unified treatment of the security services provided by UMTS that we expect will be invaluable to developers and analysts of application-oriented security services that make use of UMTS communication networks. This book could also serve as a textbook for an advanced university course in modern communication security technology. To achieve global relevance a communication system requires standardization. Standardization guarantees that entities in the system are able to communicate with each other even when they are controlled by different mobile network operators or are manufactured by different vendors. However, it is important to have a nonstandardized area that allows differentiation between operators and manufacturers. For instance, the internal structure of network entities belongs to the nonstandardized area. Security is visible in both the standard and the non-standard specifications of UMTS. As an example, communication between the mobile phone and the radio network is protected by encrypting the messages. It is important that strict standardization applies to both how encryption is carried out and which encryption keys are used, otherwise the receiving end could not reverse the operation and recover the original content of the message. On the other hand, both communicating parties have to store the encryption keys in such a way that no outsider can get access to them. It is important that this is done, but we do not have to standardize how it is done. The emphasis of our book is on the standardized features of UMTS security but not at the expense of other aspects. The book is split into two parts. The first describes the security architecture and security functionality of UMTS, while the specification and analysis of cryptographic algorithms is presented in the second part. By breaking the book down in this way we hope to offer a specialized treatment of the two different areas and methodologies that comprise the UMTS security system. While the parts can be read independently, we feel by including them in one book that the reader has the chance to become familiar with the delicate interplay between security and cryptography. This book presents the results of the extensive, demanding and strenuous work of security expert teams and individuals who together created the specifications of UMTS security. It draws largely on collaboration and discussions with the world’s foremost specialists all of whom participated in this work. In particular, we want to express our thanks to the members of 3GPP SA3, ETSI SAGE and the 3GPP algorithms task forces and, of course, our colleagues at NOKIA.1 Finally we would like to thank the publisher of the book and the editing team whose splendid work transformed our typescript into a coherent book.