36,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
payback
18 °P sammeln
  • Broschiertes Buch

The reliance on cellular communication and its use in transfer of sensitive information, both of private and business critical nature, raises the need for up to date security measures. This book discusses one security lapse in GSM architecture, lack of mutual authentication, and serves as a proof of concept where man in the middle attack was deployed on live networks. The purpose is to highlight the above mentioned flaw and to motivate changes/additions in standards to discourage such a possibility.

Produktbeschreibung
The reliance on cellular communication and its use in transfer of sensitive information, both of private and business critical nature, raises the need for up to date security measures. This book discusses one security lapse in GSM architecture, lack of mutual authentication, and serves as a proof of concept where man in the middle attack was deployed on live networks. The purpose is to highlight the above mentioned flaw and to motivate changes/additions in standards to discourage such a possibility.
Autorenporträt
The authors are Electrical Engineering graduates from the National University of Sciences and Technology with majors in Telecommunication.Ahthsham currently holds the position of RF Optimization engineer in the largest mobile operator of Pakistan.Umar is currently working of location based services using GSM.Both are avid security enthusiasts.