Chapter
Chapter 3 FUTURE TRENDS AND CHALLENGES FOR MOBILE AND CONVERGENT NETWORKS
Convergence on the Future Wireless Access
Support of Mobile Network Access
FUTURE NETWORK REQUIREMENTS
WIRELESS ACCESS TECHNOLOGIES
WIMAX and LTE Developments to Support Mobility
Some Thoughts about the Evolution of Wireless Access Technologies
MOBILITY MANAGEMENT AT THE NETWORK LAYER
Deployment Analysis and Comparison among Selected Mobility Proposals at Network Layer
Chapter 4 MACHINE-TO-MACHINE COMMUNICATION SYSTEMS: CONVERGED ARCHITECTURES, SERVICES AND INTERFERENCE EVALUATION
Building Automation and Smart Homes
Architectures and Standardization Efforts
Implementation Considerations and Challenges
IR-UWB AS PHY IN INDOOR M2M COMMUNICATIONS
Pulse Position Modulation (PPM)
Pulse Amplitude Modulation (PAM)
Pulse Shape Modulation (PSM)
Multiple Access and Whitening Techniques
Chapter 5 REDEFINING COMMUNICATION WITH 5G MOBILE TECHNOLOGY
Evolution of Wireless Networks
Implementation of 5G - Future Techonological
Implementation Issues of 5G Technology
(ii) Effect of Wave Propagation
(iv) Quality of Service (QOS) Functionality
CHALLENGES OF 5G TECHNOLOGY
ADVANTAGES OF 5G TECHNOLOGY
ECONOMICAL ANALYSIS AND VIABILITY
APPLICATIONS OF 5G TECHNOLOGY
Chapter 6 IDENTIFYING AND MITIGATING SECURITY AND PRIVACY THREATS IN MODERN TELECOMMUNCIATION INFRASTRUCTURE
Wireless Network Security and Privacy
THE IEEE 802.11 WIRELESS STANDARDS
THE RELATIONSHIP BETWEEN THE IEEE 802.11 AND WIRELESS TECHNOLOGY
IEEE 802.11 SECURITY STANDARDS AND MECHANISMS FOR WIRELESS CONNECTIVITY
SERVICE SET IDENTIFIER (SSID)
Open System Authentication
Shared Key Authentication
SECURITY WEAKNESSES IN THE IEEE 802.11 SECURITY MECHANISMS
MAC address Filtering Weaknesses
Higher Generation of Mobile Communication Systems
Security Technology for SAE/LTE
Security Requirements for LTE
LTE Security Architecture
Vulnerabilities in System Architecture
Security in a LTE Cellular System
Separation of AS and NAS Security Functions
LTE Access Procedure Vulnerabilities
Vulnerability in LTE Handover Procedure
Security in IMS (IP Multimedia Subsystem)
Security Architecture in IMS
IMS Access Security-IMS AKA
Security Vulnerabilities in IMS
HeNB Security Architecture
Security Requirements to HeNB
Security Threats Mitigation of HeNB
Security Vulnerability in HeNB
Vulnerability in MTC Security
Chapter 7 CRYPTOGRAPHY, SECURITY AND PRIVACY OF WIRED, WIRELESS AND MOBILE NETWORKS
Types of Security Services
Security Service Implementation Locations and Layers
OBSTACLES TO CRYPTOGRAPHY
Chapter 8 TECHNOLOGICAL ALTERNATIVES AND CONVERGENCE AT MULTIPLE LEVELS FOR HIGHER GENERATION OF TELECOMMUNICATION SYSTEMS
1. CONVERGENCE WITHIN THE HANDSET
3. OPTICAL-WIRELESS NETWORK
4. HOMECELL COVERAGE (HOME-ZONE)
5. VOIP AND MOBILE INTERNET CONNECTION
Wireless Cellular Alernatives
BUSINESS AND ECONOMIC ASPECTS
SERVICE PROVIDER LOCAL LOOP BANDWIDTH
MULTIPLATFORM MULTIMEDIA END USER EQUIPMENT
HOMELAND/EMERGENCY DISASTER PREPAREDNESS
Chapter 9 HANDOVER AND MOBILITY MANAGEMENT IN 4G AND BEYOND
MOST IMPORTANT ASPECTS OF 5G
POSSIBLE TECHNOLOGIES IN 5G
Requirement for Handover Mechanism
HANDOVER IN MULTI-RAT NETWORKS WITH EVOLUATED ARCHITECTURE
HANDOVER PROCEDURES IN LAST GENERATION WIRELESS NETWORKS – LTE
MOBILITY MANAGEMENT IN 4G
Mobility Management at Different Layers