DocumentCode :
3165098
Title :
Security in mobile and cordless telecommunications
Author :
Walker, Michael
fYear :
1992
fDate :
4-8 May 1992
Firstpage :
493
Lastpage :
496
Abstract :
Second generation mobile and cordless telephone systems, like GSM and DECT, provide for intersystem roaming and have integrated security features. These security features and the role played by smart cards in the implementation and management are discussed. The focus is on the security features provided in DECT because these are more comprehensive, and probably less widely known, then those provided in GSM. The method of authentication is identical to that used for authenticating subscribers accessing a GSM network. However, the DECT authentication mechanism includes an additional feature which is not provided within GSM. This feature provides for greater flexibility in the way authentication keys and authentication data may be managed.<>
Keywords :
cordless telephone systems; cryptography; digital radio systems; message authentication; mobile communication systems; smart cards; DECT; GSM; authentication; cordless telephone systems; cryptography; intersystem roaming; mobile telephone; security features; smart cards; Authentication; Communication system security; Data security; GSM; Land mobile radio cellular systems; Radio spectrum management; Roaming; Smart cards; Speech; Telephony;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
CompEuro '92 . 'Computer Systems and Software Engineering',Proceedings.
Conference_Location :
The Hague, Netherlands
Print_ISBN :
0-8186-2760-3
Type :
conf
DOI :
10.1109/CMPEUR.1992.218434
Filename :
218434
Link To Document :
بازگشت