Title :
Security in mobile and cordless telecommunications
Abstract :
Second generation mobile and cordless telephone systems, like GSM and DECT, provide for intersystem roaming and have integrated security features. These security features and the role played by smart cards in the implementation and management are discussed. The focus is on the security features provided in DECT because these are more comprehensive, and probably less widely known, then those provided in GSM. The method of authentication is identical to that used for authenticating subscribers accessing a GSM network. However, the DECT authentication mechanism includes an additional feature which is not provided within GSM. This feature provides for greater flexibility in the way authentication keys and authentication data may be managed.<>
Keywords :
cordless telephone systems; cryptography; digital radio systems; message authentication; mobile communication systems; smart cards; DECT; GSM; authentication; cordless telephone systems; cryptography; intersystem roaming; mobile telephone; security features; smart cards; Authentication; Communication system security; Data security; GSM; Land mobile radio cellular systems; Radio spectrum management; Roaming; Smart cards; Speech; Telephony;
Conference_Titel :
CompEuro '92 . 'Computer Systems and Software Engineering',Proceedings.
Conference_Location :
The Hague, Netherlands
Print_ISBN :
0-8186-2760-3
DOI :
10.1109/CMPEUR.1992.218434