The Long Term Evolution (LTE) is the newly adopted standard technology to offer enhanced capacity and coverage for mobility networks, providing advanced multimedia services beyond traditional voice and short messaging traffic for billions of users. This new cellular communication system is the natural evolution of 3rd Generation Partnership Project (3GPP)-based access networks, enhancing the Universal Mobile Telecommunications System (UMTS). LTE introduces a substantial redesign of the network architecture resulting in the new eUTRAN (Enhanced Universal Terrestrial Radio Access Network) and the EPC (Enhanced Packet Core). In this context, the LTE Radio Access Network (RAN) is built upon a redesigned physical layer and based on an Orthogonal Frequency Division Multiple Access (OFDMA) modulation, which features robust performance in challenging multipath environments and substantially improves spectrum efficiency and capacity. Moreover, the new all-IP core architecture is designed to be more flexible and flatter, with a logical separation of the traffic related functions and the control and signaling functions.Over the last few years, researchers have published and presented potential vulnerabilities and attacks against the second generation of mobile networks, the Global System for Mobile Communications (GSM). Although technology, encryption schemes and security in general have drastically improved in LTE with respect of legacy GSM networks, security research should continue proactively working towards secure and resilient mobile communication systems.In this context, the cyber-security landscape has changed drastically over the last few years. It is now characterized by large scale security threats and the advent of sophisticated intrusions. These new threats illustrate the importance of strengthening the resiliency of mobility networks against security attacks, ensuring this way full mobility network availability.This special issue of the Journal of Cyber Security and Mobility addresses research advances in mobility security for LTE next generation mobility networks and other wireless communication systems. Two of the papers in this special issue analyze the threat of radio jamming. Lichtman et al. introduce a sophisticated reinforcement learning anti-jamming technique aimed at protecting frequency hopping wireless systems from jamming attacks while maximizing link throughput. Similarly, Kornemann et al. introduce a jamming detection mechanism for Wireless Sensor Networks (WSN), which are known to be substantially vulnerable to this type of attack.Focusing specifically on LTE mobile networks, Jermyn et al. perform a thorough simulation analysis of potential Denial of Service attacks against the eUTRAN by means of a botnet of malware-infected mobile terminals saturating the radio interface with large amounts of traffic. This type of malware infections and the connections of such a botnet to the malicious command and control servers could be detected with the system introduced by Bickford et al. This advanced detection scheme is capable to detect malicious activity in mobile terminals and proceed to mitigate and block the malicious applications.Finally, Alzahrani et al. present a very detailed and thorough analysis of the security research published over the last few years on mobile malware analysis, detection and mitigation. The valuable insights in this paper set a common ground and framework to facilitate research in this area, as well as to share results and easily replicate experiments.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
The Long Term Evolution (LTE) is the newly adopted standard technology to offer enhanced capacity and coverage for mobility networks, providing advanced multimedia services beyond traditional voice and short messaging traffic for billions of users. This new cellular communication system is the natural evolution of 3rd Generation Partnership Project (3GPP)-based access networks, enhancing the Universal Mobile Telecommunications System (UMTS). LTE introduces a substantial redesign of the network architecture resulting in the new eUTRAN (Enhanced Universal Terrestrial Radio Access Network) and the EPC (Enhanced Packet Core). In this context, the LTE Radio Access Network (RAN) is built upon a redesigned physical layer and based on an Orthogonal Frequency Division Multiple Access (OFDMA) modulation, which features robust performance in challenging multipath environments and substantially improves spectrum efficiency and capacity. Moreover, the new all-IP core architecture is designed to be more flexible and flatter, with a logical separation of the traffic related functions and the control and signaling functions. Over the last few years, researchers have published and presented potential vulnerabilities and attacks against the second generation of mobile networks, the Global System for Mobile Communications (GSM). Although technology, encryption schemes and security in general have drastically improved in LTE with respect of legacy GSM networks, security research should continue proactively working towards secure and resilient mobile communication systems. In this context, the cyber-security landscape has changed drastically over the last few years. It is now characterized by large scale security threats and the advent of sophisticated intrusions. These new threats illustrate the importance of strengthening the resiliency of mobility networks against security attacks, ensuring this way full mobility network availability. This special issue of the Journal of Cyber Security and Mobility addresses research advances in mobility security for LTE next generation mobility networks and other wireless communication systems. Two of the papers in this special issue analyze the threat of radio jamming. Lichtman et al. introduce a sophisticated reinforcement learning anti-jamming technique aimed at protecting frequency hopping wireless systems from jamming attacks while maximizing link throughput. Similarly, Kornemann et al. introduce a jamming detection mechanism for Wireless Sensor Networks (WSN), which are known to be substantially vulnerable to this type of attack. Focusing specifically on LTE mobile networks, Jermyn et al. perform a thorough simulation analysis of potential Denial of Service attacks against the eUTRAN by means of a botnet of malware-infected mobile terminals saturating the radio interface with large amounts of traffic. This type of malware infections and the connections of such a botnet to the malicious command and control servers could be detected with the system introduced by Bickford et al. This advanced detection scheme is capable to detect malicious activity in mobile terminals and proceed to mitigate and block the malicious applications. Finally, Alzahrani et al. present a very detailed and thorough analysis of the security research published over the last few years on mobile malware analysis, detection and mitigation. The valuable insights in this paper set a common ground and framework to facilitate research in this area, as well as to share results and easily replicate experiments.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: As New. Unread book in perfect condition. Bestandsnummer des Verkäufers 21664452
Anzahl: Mehr als 20 verfügbar
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: New. Bestandsnummer des Verkäufers 21664452-n
Anzahl: Mehr als 20 verfügbar
Anbieter: PBShop.store US, Wood Dale, IL, USA
PAP. Zustand: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Bestandsnummer des Verkäufers L0-9788793237056
Anzahl: Mehr als 20 verfügbar
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
PAP. Zustand: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Bestandsnummer des Verkäufers L0-9788793237056
Anzahl: Mehr als 20 verfügbar
Anbieter: Lucky's Textbooks, Dallas, TX, USA
Zustand: New. Bestandsnummer des Verkäufers ABLIING23Apr0316110324993
Anzahl: Mehr als 20 verfügbar
Anbieter: Rarewaves.com USA, London, LONDO, Vereinigtes Königreich
Paperback. Zustand: New. Bestandsnummer des Verkäufers LU-9788793237056
Anzahl: Mehr als 20 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Bestandsnummer des Verkäufers ria9788793237056_new
Anzahl: Mehr als 20 verfügbar
Anbieter: Chiron Media, Wallingford, Vereinigtes Königreich
PF. Zustand: New. Bestandsnummer des Verkäufers 6666-IUK-9788793237056
Anzahl: 10 verfügbar
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
Zustand: New. Bestandsnummer des Verkäufers 21664452-n
Anzahl: Mehr als 20 verfügbar
Anbieter: Rarewaves USA, OSWEGO, IL, USA
Paperback. Zustand: New. Bestandsnummer des Verkäufers LU-9788793237056
Anzahl: Mehr als 20 verfügbar