{"title":"Security in mobile and cordless telecommunications","authors":"M. Walker","doi":"10.1109/CMPEUR.1992.218434","DOIUrl":null,"url":null,"abstract":"Second generation mobile and cordless telephone systems, like GSM and DECT, provide for intersystem roaming and have integrated security features. These security features and the role played by smart cards in the implementation and management are discussed. The focus is on the security features provided in DECT because these are more comprehensive, and probably less widely known, then those provided in GSM. The method of authentication is identical to that used for authenticating subscribers accessing a GSM network. However, the DECT authentication mechanism includes an additional feature which is not provided within GSM. This feature provides for greater flexibility in the way authentication keys and authentication data may be managed.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":"140 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMPEUR.1992.218434","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
Second generation mobile and cordless telephone systems, like GSM and DECT, provide for intersystem roaming and have integrated security features. These security features and the role played by smart cards in the implementation and management are discussed. The focus is on the security features provided in DECT because these are more comprehensive, and probably less widely known, then those provided in GSM. The method of authentication is identical to that used for authenticating subscribers accessing a GSM network. However, the DECT authentication mechanism includes an additional feature which is not provided within GSM. This feature provides for greater flexibility in the way authentication keys and authentication data may be managed.<>