Abstract
Security is a critical issue in mobile radio applications both forthe users and providers of such systems. Although the same may besaid of all communications systems, mobile application havespecial requirements and vulnerabilities, and are therefore ofspecial concern. Emerging wireless networks share many commoncharacteristics with traditional wire-line networks such as publicswitch telephone/data networks, and hence many security issueswith the wire-line networks also apply to the wirelessenvironment. However the integration of security features intowireless communication must take into account restrictions thatmay apply to their use such as small packet size, low bandwidth,high transmission costs, limited processing and storage resourcesand real time constraints. In this paper security requirements inwireless communications along with security features in 2G and 3Gsystems are described.
Similar content being viewed by others
References
R.R. Joos and A.R. Tripathi, “Mutual Authentication in Wireless Networks”, Technical Report, Computer Science Department, University of Minnesota, 1997.
D. Samfat, R. Molva and N. Asokan, “Untraceability in Mobile Networks", in Proc. of the ACMInternational Conference on Mobile Computing and Networking, Nov., 1995, pp. 26–36.
P. Adhate, “Biometrics and it's Coming Role in Mobile Ecommerce”, http://www.cs.nyu.edu/ adha7755/
M. Rahnema, “Overview of the GSM System and Protocol Architecture”, IEEE Communications Magazine, 1993.
L. Pesonen, “GSM Interception”, 1999. http://www.dia.unisa.it/ads.dir/corso-security/www/CORSO-9900/a5/Netsec/netsec.html
“3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security Principles and Objectives”, 3GPP TS 33.120 Release 4.
“3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security Architecture”, 3GPP TS 33.102 Release 99. N. Nakajima, “Future Mobile Communications Systems in Japan”, Wireless Personal Communications, Vol. 17, Nos. 2–3, pp. 209–223, 2001.
Rehnema M., “Overview of GSM System and Protocol Architecture”, IEEE Communications Magazine, Vol. 31, pp. 92–100, 1993.
Hirose S. and Yoshida S., “A User Authentication Scheme with Identity and Location Privacy”, Proc. of 2001 Symposium on Cryptography and Information Security, pp. 619–624, Japan, Jan., 2001.
Cellular Digital Packet Data (CDPD) System Specification, Release 1.0, July 1993.
Molva R., Samfat D. and Tsudik G., “Authentication of Mobile Users”, IEEE Networks Special Issue in Mobile Communications, Vol. 8 (2), pp. 26–35, 1994.
Bird R., Gopal I., Herzberg A., Janson P., Kutten S., Molva R. and Yung M., “The Kryptoknight Family of Light-Weight Protocols for Authentication and Key Distribution”, IEEE/ACMTrans. on Networking,Vol.3, No. 1, pp. 31–41, 1995.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Rahman, M.G., Imai, H. Security in Wireless Communication. Wireless Personal Communications 22, 213–228 (2002). https://doi.org/10.1023/A:1019968506856
Issue Date:
DOI: https://doi.org/10.1023/A:1019968506856