DocumentCode
872722
Title
Privacy and authentication needs of PCS
Author
Wilkes, Joseph E.
Author_Institution
AT&T Bell Labs., Holmdel, NJ, USA
Volume
2
Issue
4
fYear
1995
fDate
8/1/1995 12:00:00 AM
Firstpage
11
Lastpage
15
Abstract
To provide the proper privacy and authentication for a PCS phone, some cryptographic system will be necessary. The article defines requirements that a cryptographic system used for PCS would need to meet. It does not attempt to define the cryptographic system. It does provide a template for examining cryptographic systems to choose between cryptographic alternatives. Some of the cryptographic requirements are in the air interface between the PCS phone and the radio port. Other requirements are on databases stored in the network and on information shared between systems in the process of handovers or giving service for roaming units. The paper first discusses four levels of privacy (including defining two new levels). Then, requirements are identified and discussed in the areas of privacy, theft resistance, radio system performance, system lifetime, physical requirements as implemented in portable/mobile PCS phones, and law enforcement needs
Keywords
cellular radio; cryptography; data privacy; personal communication networks; PCS; air interface; authentication; cryptographic system; databases; handover; law enforcement; mobile PCS phones; physical requirements; portable PCS phones; privacy; radio port; radio system performance; roaming units; system lifetime; theft resistance; Authentication; Batteries; Cellular phones; Communication industry; Internet telephony; Monitoring; PROM; Personal communication networks; Privacy; Wires;
fLanguage
English
Journal_Title
Personal Communications, IEEE
Publisher
ieee
ISSN
1070-9916
Type
jour
DOI
10.1109/98.403453
Filename
403453
Link To Document