Wireless network security architecture

被引:4
作者
Blumenthal, U [1 ]
Marcovici, M [1 ]
Mizikovsky, S [1 ]
Patel, S [1 ]
Sundaram, GS [1 ]
Wong, M [1 ]
机构
[1] Lucent Technol, Wireless Secure Commun & Fraud Anal Grp, Whippany, NJ USA
关键词
D O I
10.1002/bltj.10003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cellular bandits have exploited security limitations of analog technology from its infancy. First-generation analog system security has been primarily left up to system manufacturers and service providers. With the advent of digital technology (second generation [2G]), the standards organizations aggressively developed techniques and cryptographic methods to protect the service provider from fraudulent use of network resources and to provide user privacy. Third-generation (3G) digital wireless systems offer significant improvement of security techniques that address all known 2G deficiencies and allow strong service protection for many years to come. This paper discusses in detail the wireless security architecture evolution (voice and data) with special emphasis on the latest standards developed for 3G wireless systems, including 2G13G interoperability issues. Both the Universal Mobile Telecommunications System (developed by the 3rd Generation Partnership Project [3GPP]) and CDMA2000* (developed by the 3rd Generation Partnership Project 2 [3GPP2]) architectures are addressed. (C) 2002 Lucent Technologies Inc.
引用
收藏
页码:19 / 36
页数:18
相关论文
共 15 条
[1]  
*3 GEN PARTN PROJ, SPEC GROUP SERV SYST
[2]  
*3 GEN PARTN PROJ, TECHN SPEC GROUP TER
[3]  
*3 GEN PARTN PROJ, 2000, UPP LAY LAY 3 SIGN S
[4]  
*3 GEN PARTN PROJ, 2001, TECHN SPEC GROUP TER
[5]  
*3 GEN PARTN PROJ, 2002, IP NETW ARCH MOD CDM
[6]  
*3 GEN PARTN PROJ, 2001, HIGH RAT PACK DAT AI
[7]  
[Anonymous], ADV CRYPTOLOGY CRYPT
[8]  
Bellare M., 1996, CRYPTO 96
[9]  
*INT ENG TASK FORC, 1998, US HMAC SHA 1 96 ESP
[10]  
National Institute of Standards and Technology, 1995, SEC HASH STAND