• DocumentCode
    872707
  • Title

    Techniques for privacy and authentication in personal communication systems

  • Author

    Brown, Dan

  • Author_Institution
    Corp. Res. Lab., Motorola Inc., USA
  • Volume
    2
  • Issue
    4
  • fYear
    1995
  • fDate
    8/1/1995 12:00:00 AM
  • Firstpage
    6
  • Lastpage
    10
  • Abstract
    Describes progress in the development of authentication and key agreement (AKA) processes for personal communication systems (PCS). A conceptual framework is first established; this is a three-part general model that characterizes all AKA techniques. Then three proposed AKA methods are compared using this model. These methods are the so-called secret key method of GSM, the secret key method of United States Digital Cellular (IS-54, IS-95), and a public key/secret key method. Finally, a summary is presented that indicates the AKA method of preference for some proposed PCS air interfaces that are under development by standards bodies
  • Keywords
    access protocols; cellular radio; data privacy; personal communication networks; public key cryptography; AKA techniques; GSM; IS-54; IS-95; PCS; United States Digital Cellular; air interfaces; authentication; authentication and key agreement processes; personal communication systems; privacy; public key/secret key method; secret key method; standards bodies; three-part general model; Access control; Authentication; Cryptography; GSM; Personal communication networks; Privacy; Protection; Telecommunication traffic; Telephone sets; Traffic control;
  • fLanguage
    English
  • Journal_Title
    Personal Communications, IEEE
  • Publisher
    ieee
  • ISSN
    1070-9916
  • Type

    jour

  • DOI
    10.1109/98.403452
  • Filename
    403452