Title :
Security requirements of next generation wireless communications
Author :
Kim, Jungjoon ; Oh, Mina ; Kim, Taegun
Author_Institution :
Wireless Commun. Res. Lab., Korea Telecom, Seoul, South Korea
Abstract :
Security weakness due to deficiencies in the second generation security protocols and limitations never intended to be provided are examined. In the second generation security services, user authentication and user anonymity need to be enhanced. Security requirements identified in the ITU-R M1078 document are reviewed in categories of access related, radio interface related, user association related, terminal related requirements, network operational requirements, and security management requirements. Additional security services required to be applied to the new environment of threats of the next generation wireless systems are presented
Keywords :
digital radio; land mobile radio; message authentication; network interfaces; protocols; telecommunication security; ITU-R M1078 document; access requirements; digital transmission; mobile communication systems; network operation; next generation wireless communications; radio interface; second generation security protocols; security management; security requirements; security services; security weakness; terminal requirements; threats; user anonymity; user association; user authentication; Access protocols; Authentication; Communication system security; Cryptography; Data communication; Data security; GSM; Mobile communication; Personal communication networks; Wireless communication;
Conference_Titel :
Communication Technology Proceedings, 1998. ICCT '98. 1998 International Conference on
Conference_Location :
Beijing
Print_ISBN :
7-80090-827-5
DOI :
10.1109/ICCT.1998.743402