Abstract
This chapter presents emerging wireless technologies applied to the domain of healthcare, which has been identified as a very important domain of increasing interest to researchers. The chapter also provides an overview of the security issues related to these emerging technologies and networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shokri, R., Theodorakopoulos, G., Le Boudec, J., & Hubaux, J. (2011). Quantifying location privacy. In IEEE symposium on security and privacy (SP), 2011 (pp. 247–262). New York: IEEE Press.
3rd Generation Partnership Project, 3GPP TR 33.821 V9.0.0 (2009-06), 3GPP Rationale and track of security decisions in Long Term Evolved (LTE) RAN/3GPP System Architecture Evolution (SAE) (Release 9).
Mjølsnes, S., & Tsay, J. K. (2012). Computational security analysis of the UMTS and LTE authentication and key agreement protocols. arXiv:1203.3866.
Nergiz, M. E., Atzori, M., & Saygin, Y. (2008). Towards trajectory anonymization: a generalization-based approach. In Proceedings of the SIGSPATIAL ACM GIS 2008 international workshop on security and privacy in GIS and LBS (pp. 52–61). New York: ACM.
Sweeney, L. (2002). k-Anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557–570.
Terrovitis, M., & Mamoulis, N. (2008). Privacy preservation in the publication of trajectories. In 9th international conference on mobile data management, MDM’08 (pp. 65–72). New York: IEEE Press.
Truta, T. M., & Campan, A. (2007). K-anonymization incremental maintenance and optimization techniques. In Proceedings of the 2007 ACM symposium on applied computing (pp. 380–387). New York: ACM.
Zhang, C., & Huang, Y. (2009). Cloaking locations for anonymous location based services: a hybrid approach. GeoInformatica, 13(2), 159–182.
Zhang, X., Acıiçmez, O., & Seifert, J. P. (2007). A trusted mobile phone reference architecture via secure kernel. In Proceedings of the 2007 ACM workshop on scalable trusted computing (pp. 7–14). New York: ACM.
Zheng, Y., He, D., Yu, W., & Tang, X. (2005). Trusted computing-based security architecture for 4G mobile networks. In Sixth international conference on parallel and distributed computing, applications and technologies, PDCAT 2005 (pp. 251–255). New York: IEEE Press.
Zheng, Y., He, D., Tang, X., & Wang, H. (2005). AKA and authorization scheme for 4G mobile networks based on trusted mobile platform. In Fifth international conference on information, communications and signal processing (pp. 976–980). New York: IEEE Press.
Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., & Tan, K. L. (2008). Private queries in location based services: anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD international conference on management (pp. 121–132). New York: ACM.
3GPP TR 22.220 V11.6.0 (2012-09) 3rd Generation Partnership Project, 3GPP TR 22.220 V11.6.0 (2012-00), Service requirements for Home Node B (HNB) and Home eNode B (HeNB) (Release 11).
3GPP TS 22.278 V8.4.0 (2007-12) 3rd Generation Partnership Project, 3GPP TS 22.278 V8.4.0 (2007-12), Service requirements for the Evolved Packet System (EPS) (Release 8).
3rd Generation Partnership Project, 3GPP TS 33.401 V11.2.0 (2011-12), 3GPP System Architecture Evolution (SAE); Security architecture (Release 11).
3rd Generation Partnership Project, 3GPP TS 23.003 V11.3.0 (2012-09), 3GPP Numbering, addressing and identification (Release 11).
3rd Generation Partnership Project, 3GPP TS 33.102 V11.2.0 (2012-03), 3G Security, security architecture (Release 11).
Inamura, Y., Nakayama, T., & Takeshita, A. (2005). Trusted mobile platform technology for secure terminals. NTT DoCoMo Technical Journal, 7, 25–39.
Molina, J., Lee, H., Lee, S., & Song, Z. (2006). A mobile trusted platform module (MTPM) architecture. In Proc. of 2nd workshop on advances in trusted computing (WATC06).
DoCoMo, Trusted Mobile Platform Network (2004). Trusted Mobile Platform: Hardware Architecture Description Rev1. 0. Trusted Computing Group.
DoCoMo, Trusted Mobile Platform Network (2004). Trusted Mobile Platform: Software Architecture Description Rev1. 0. Trusted Computing Group.
DoCoMo, Trusted Mobile Platform Network (2004). Trusted Mobile Platform: Protocol Specification Document Rev1. 0. Trusted Computing Group.
Aiash, M., Mapp, G., & Lasebae, A. (2012). A survey on authentication and key agreement protocols in heterogeneous networks. International Journal of Network Security & Its Applications, 4(4), 199–214.
Chaouchi, H., & Laurent-Maknavicius, M. (2009). Wireless and mobile network security. New York: ISTE/Wiley.
Yahiya, T. A., & Chaouchi, H. (2010). On the integration of LTE and mobile WiMAX networks. In Proceedings of 19th international conference on computer communications and networks (ICCCN) (pp. 1–5). New York: IEEE Press.
Bilogrevic, I., Jadliwala, M., & Hubaux, J. P. (2010). Security issues in next generation mobile networks: LTE and femtocells. In 2nd international femtocell workshop, Luton, UK.
Freudiger, J., Shokri, R., & Hubaux, J. P. (2009). On the optimal placement of mix zones. In Privacy enhancing technologies (pp. 216–234). Berlin: Springer.
Borgaonkar, R., Redon, K., & Seifert, J. P. (2011). Security analysis of a femtocell device. In Proceedings of the 4th international conference on security of information and networks (pp. 95–102). New York: ACM.
Zhang, Y., Zheng, J., & Hu, H. (Eds.) (2008). Security in wireless mesh networks. Boca Raton: Auerbach.
Eian, M., & Mjølsnes, S. F. (2011). The modeling and comparison of wireless network denial of service attacks. In Proceedings of the 3rd ACM SOSP workshop on networking, systems, and applications on mobile handhelds (p. 7). New York: ACM.
Gollakota, S., Ahmed, N., Zeldovich, N., & Katabi, D. (2011). Secure in-band wireless pairing. In USENIX security symposium.
Bocan, V., & Cretu, B. (2006). Threats and countermeasures in GSM networks. Journal of Networks, 1(6), 18–27.
Forsberg, D., Horn, G., Moeller, W., & Niemi, V. (2010). LTE security. New York: Wiley.
Shearer, J., & Gutmann, P. (1996). Government, cryptography, and the right to privacy. Journal of Universal Computer Science, 2(3), 113–146.
Location-based Service. http://en.wikipedia.org/wiki/Location-based_service.
Steiniger, S., Neun, M., & Edwardes, A. (2006). Foundations of location based services. Lecture Notes on LBS, v. 1.0.
Quercia, D., Lathia, N., Calabrese, F., Di Lorenzo, G., & Crowcroft, J. (2010). Recommending social events from mobile phone location data. In IEEE 10th international conference on data mining (ICDM) (pp. 971–976). New York: IEEE Press.
Northstream White Paper, 2012, LTE and the 1800 MHz opportunity.
Infonetics: femtocell market set to double in 2012. http://lteworld.org/news/infonetics-femtocell-market-set-double-2012.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this chapter
Cite this chapter
Abdo, J.B., Chaouchi, H., Demerjian, J. (2013). Security in Emerging 4G Networks. In: Chilamkurti, N., Zeadally, S., Chaouchi, H. (eds) Next-Generation Wireless Technologies. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-5164-7_12
Download citation
DOI: https://doi.org/10.1007/978-1-4471-5164-7_12
Publisher Name: Springer, London
Print ISBN: 978-1-4471-5163-0
Online ISBN: 978-1-4471-5164-7
eBook Packages: Computer ScienceComputer Science (R0)