Title :
Techniques for privacy and authentication in personal communication systems
Author_Institution :
Corp. Res. Lab., Motorola Inc., USA
fDate :
8/1/1995 12:00:00 AM
Abstract :
Describes progress in the development of authentication and key agreement (AKA) processes for personal communication systems (PCS). A conceptual framework is first established; this is a three-part general model that characterizes all AKA techniques. Then three proposed AKA methods are compared using this model. These methods are the so-called secret key method of GSM, the secret key method of United States Digital Cellular (IS-54, IS-95), and a public key/secret key method. Finally, a summary is presented that indicates the AKA method of preference for some proposed PCS air interfaces that are under development by standards bodies
Keywords :
access protocols; cellular radio; data privacy; personal communication networks; public key cryptography; AKA techniques; GSM; IS-54; IS-95; PCS; United States Digital Cellular; air interfaces; authentication; authentication and key agreement processes; personal communication systems; privacy; public key/secret key method; secret key method; standards bodies; three-part general model; Access control; Authentication; Cryptography; GSM; Personal communication networks; Privacy; Protection; Telecommunication traffic; Telephone sets; Traffic control;
Journal_Title :
Personal Communications, IEEE