期刊文献+

The User-level Security of Mobile Communication Systems 被引量:2

The User-level Security of Mobile Communication Systems
原文传递
导出
摘要 This paper studies the user-level security of mobile systems . The currentmobile phone users trust the invisible security of the 2G systems. The evolution from thesecond-generation mobile systems (2G) to the third generation systems (3G) will introduce thethreats and opportunities of the Internet to the world of mobile communications. From the technicalpoint of view, the new security requirements are similar to the security requirements met with todayin a company Intranet environment. There is, however, one great difference; the charge paid foraccessing the service. In future the users of mobile systems will have to be more aware of thesecurity issues. This paper studies the user-level security of mobile systems . The currentmobile phone users trust the invisible security of the 2G systems. The evolution from thesecond-generation mobile systems (2G) to the third generation systems (3G) will introduce thethreats and opportunities of the Internet to the world of mobile communications. From the technicalpoint of view, the new security requirements are similar to the security requirements met with todayin a company Intranet environment. There is, however, one great difference; the charge paid foraccessing the service. In future the users of mobile systems will have to be more aware of thesecurity issues.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2002年第3期62-69,共8页 中国邮电高校学报(英文版)
关键词 SECURITY mobile communication system USER security mobile communication system user
  • 相关文献

参考文献15

  • 1TORRIERI, D J. Principles of secure communication systems[M]. London, Boston: Artech Hoste, 1992.
  • 2ETSI GSM 11.14 -- 1999. Digital cellular telecommunications system (Phase 2+); Specification of the SIM application toolkit for the Subscriber Identity Module-Mobile Equipment (SIM-ME), Version 6.3.0 [S].
  • 33GPP TS 21.133 Release 4, Security Threats and requirements[S].
  • 4IEEE Std 802.11 -- 1997. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications [S].
  • 5RFC 2401: Security architecture for the internet protocol[EB/OL]. http:∥www.ietf.org/rfc/rfc2401.txt, 1998,11.
  • 6RFC 2409: The Internet Key Exchange (IKE)[EB/OL]. http:∥www.ietf.org/rfc/rfc2409.txt, November 1998.
  • 7ETSI BRAN TR 101.031, HIPERLAN/2 Requirements and Architecture for wireless broadband access[S].
  • 8Declan McCullagh. Cell phone crept penetrated[EB/OL]. Dec. 6. 1999 http:∥wired.lycos.com/news/politics/0,1283,32900,00.html
  • 93GPP TSG SA Security working group [EB/OL]. ftp:∥ftp.3gpp.org/TSG_SA/WG3_Security
  • 103GPP TS 33.102 Release 4, 3G security architecture [S].

同被引文献18

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部