Title :
Public key infrastructure in mobile systems
Author :
Dankers, J. ; Garefalakis, T. ; Schaffelhofer, R. ; Wright, T.
Author_Institution :
Siemens Atea, Herentals, Belgium
fDate :
10/1/2002 12:00:00 AM
Abstract :
In current mobile systems, some applications to some extent already use public key techniques and an underlying public key infrastructure (PKI) to provide end-to-end security, and such use is widely expected to grow. This paper provides an overview of the basic techniques and the entities that are involved in a PKI and describes how they are used in current mobile systems. The paper also highlights the envisaged use of PKI in future mobile systems and the challenges that brings, drawing on results of the European Union´s SHAMAN project.
Keywords :
cellular radio; protocols; public key cryptography; telecommunication security; European Union; GSM system; PKI; SHAMAN project; asymmetric/public key cryptography; cellular radio system; certificates; end-to-end security; mobile systems; public key infrastructure; security protocols; standardisation activities; symmetric/secret key cryptography;
Journal_Title :
Electronics & Communication Engineering Journal
DOI :
10.1049/ecej:20020501