Contents: Cryptography for Mobile Security; PKI in Mobile Systems; The Smartcard as a Mobile Seurity Device; Security Mobile Tokens; UMTS Security; and more.
Over the last two decades, mobile telecommunications has grown dramatically, from a small niche technology to a massive industry. Mobile telephones are now ubiquitous, and the divisions between PCs, PDAs, mobile telephones and other mobile devices are becoming increasingly blurred. Against this background, the security of information of both the devices themselves, and the information handled by these devices, is becoming ever more important.Security for Mobility pulls together up to the minute research from an international group of academics and professionals working in industry. The main text of the book is divided into five parts - underlying technologies; network security; mobile code issues; application security; and the future. Each chapter of the book is the collaboration of different authors, including many of the leading European experts currently working within the field. Thus each chapter is self-contained and can be read independently, although there are many relationships between the various chapters.The book will be of interest to engineers and computer scientists working in security-related aspects of the communications, computing and telecommunications industries, as well as postgraduate students and academics working within these fields.
Part IChapter 1: Cryptography for mobile securityChapter 2: PKI in mobile systemsChapter 3: The personal PKIChapter 4: The smartcard as a mobile security deviceChapter 5: Secure mobile tokens - the futurePart II: Network securityChapter 6: UMTS securityChapter 7: Securing network access in future mobile systemsChapter 8: Public key based network accessChapter 9: Security in personal area networksChapter 10: Towards the security of routing in ad hoc networksChapter 11: Security issues in a MobileIPv6 networkPart III: Mobile code issuesChapter 12: Security for agent systems and mobile agentsChapter 13: Security issues for downloaded code in mobile phonesPart IV: Application securityChapter 14: Secure mobile commerceChapter 15: Securing the delivery of digital content over the InternetChapter 16: Security for future standardised DRMPart V: The futureChapter 17: Pioneering advanced mobile privacy and security