TECHNIQUES FOR PRIVACY AND AUTHENTICATION IN PERSONAL COMMUNICATION-SYSTEMS

被引:33
作者
BROWN, D
机构
来源
IEEE PERSONAL COMMUNICATIONS | 1995年 / 2卷 / 04期
关键词
D O I
10.1109/98.403452
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Personal Communication Systems (PCS) are anticipated to bring ubiquitous wireless telephony into widespread public use. To help further this goal, system designers are pursuing solutions to a number of challenges. These include accommodations for terminal (handset) mobility, personal mobility, universal roaming, access control, and the protection of user information sent via the airwaves. Of these, the latter two are often considered as a single subsystem called “Privacy and Authentication" (P&A). A well-designed P&A technique is necessary to protect assets. Network assets are protected by the access control (authentication) portion which enables legitimate users to utilize network services for which they have sub-scribed, while denying service to “hackers" who would steal services and monopolize resources. Subscriber assets (e.g., confidential information) are protected by encryption of traffic (privacy) on the radio link. © 1995 IEEE
引用
收藏
页码:6 / 10
页数:5
相关论文
共 4 条
[1]   FULLY-FLEDGED 2-WAY PUBLIC-KEY AUTHENTICATION AND KEY AGREEMENT FOR LOW-COST TERMINALS [J].
BELLER, MJ ;
YACOBI, Y .
ELECTRONICS LETTERS, 1993, 29 (11) :999-1001
[2]  
BELLER MJ, 1991, DEC P IEEE GLOB TEL, P1922
[3]  
1992, EIA IS54 EL IND ASS
[4]  
1991, ETSI GSM0320 EUR TEL