{"title":"Address security concepts for mobile-telephone service","authors":"M. Oleyar","doi":"10.1109/VTC.1976.1622319","DOIUrl":null,"url":null,"abstract":"Various levels of protection from unauthorized use of a mobile-telephone service can be provided where the exchange for the service is under stored-program control. The security techniques that provide this protection can be upgraded on a per-subscriber or per-system basis as the incidence of unauthorized use increases. The \"ultimate\" arrangement provides for the encryption of variable passwords. Proper protection of auxiliary storage devices precludes compromise of the cipher-keys assigned to individual mobile units. The techniques that apply and, in particular, those that provide for better security, are more readily implemented in a system with common channel signaling where signaling speeds are considerably faster than those that are used in present-day practice.","PeriodicalId":342659,"journal":{"name":"26th IEEE Vehicular Technology Conference","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1976-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"26th IEEE Vehicular Technology Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/VTC.1976.1622319","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Various levels of protection from unauthorized use of a mobile-telephone service can be provided where the exchange for the service is under stored-program control. The security techniques that provide this protection can be upgraded on a per-subscriber or per-system basis as the incidence of unauthorized use increases. The "ultimate" arrangement provides for the encryption of variable passwords. Proper protection of auxiliary storage devices precludes compromise of the cipher-keys assigned to individual mobile units. The techniques that apply and, in particular, those that provide for better security, are more readily implemented in a system with common channel signaling where signaling speeds are considerably faster than those that are used in present-day practice.