摘要
This paper studies the user-level security of mobile systems . The currentmobile phone users trust the invisible security of the 2G systems. The evolution from thesecond-generation mobile systems (2G) to the third generation systems (3G) will introduce thethreats and opportunities of the Internet to the world of mobile communications. From the technicalpoint of view, the new security requirements are similar to the security requirements met with todayin a company Intranet environment. There is, however, one great difference; the charge paid foraccessing the service. In future the users of mobile systems will have to be more aware of thesecurity issues.
This paper studies the user-level security of mobile systems . The currentmobile phone users trust the invisible security of the 2G systems. The evolution from thesecond-generation mobile systems (2G) to the third generation systems (3G) will introduce thethreats and opportunities of the Internet to the world of mobile communications. From the technicalpoint of view, the new security requirements are similar to the security requirements met with todayin a company Intranet environment. There is, however, one great difference; the charge paid foraccessing the service. In future the users of mobile systems will have to be more aware of thesecurity issues.