DocumentCode
872707
Title
Techniques for privacy and authentication in personal communication systems
Author
Brown, Dan
Author_Institution
Corp. Res. Lab., Motorola Inc., USA
Volume
2
Issue
4
fYear
1995
fDate
8/1/1995 12:00:00 AM
Firstpage
6
Lastpage
10
Abstract
Describes progress in the development of authentication and key agreement (AKA) processes for personal communication systems (PCS). A conceptual framework is first established; this is a three-part general model that characterizes all AKA techniques. Then three proposed AKA methods are compared using this model. These methods are the so-called secret key method of GSM, the secret key method of United States Digital Cellular (IS-54, IS-95), and a public key/secret key method. Finally, a summary is presented that indicates the AKA method of preference for some proposed PCS air interfaces that are under development by standards bodies
Keywords
access protocols; cellular radio; data privacy; personal communication networks; public key cryptography; AKA techniques; GSM; IS-54; IS-95; PCS; United States Digital Cellular; air interfaces; authentication; authentication and key agreement processes; personal communication systems; privacy; public key/secret key method; secret key method; standards bodies; three-part general model; Access control; Authentication; Cryptography; GSM; Personal communication networks; Privacy; Protection; Telecommunication traffic; Telephone sets; Traffic control;
fLanguage
English
Journal_Title
Personal Communications, IEEE
Publisher
ieee
ISSN
1070-9916
Type
jour
DOI
10.1109/98.403452
Filename
403452
Link To Document