• DocumentCode
    872722
  • Title

    Privacy and authentication needs of PCS

  • Author

    Wilkes, Joseph E.

  • Author_Institution
    AT&T Bell Labs., Holmdel, NJ, USA
  • Volume
    2
  • Issue
    4
  • fYear
    1995
  • fDate
    8/1/1995 12:00:00 AM
  • Firstpage
    11
  • Lastpage
    15
  • Abstract
    To provide the proper privacy and authentication for a PCS phone, some cryptographic system will be necessary. The article defines requirements that a cryptographic system used for PCS would need to meet. It does not attempt to define the cryptographic system. It does provide a template for examining cryptographic systems to choose between cryptographic alternatives. Some of the cryptographic requirements are in the air interface between the PCS phone and the radio port. Other requirements are on databases stored in the network and on information shared between systems in the process of handovers or giving service for roaming units. The paper first discusses four levels of privacy (including defining two new levels). Then, requirements are identified and discussed in the areas of privacy, theft resistance, radio system performance, system lifetime, physical requirements as implemented in portable/mobile PCS phones, and law enforcement needs
  • Keywords
    cellular radio; cryptography; data privacy; personal communication networks; PCS; air interface; authentication; cryptographic system; databases; handover; law enforcement; mobile PCS phones; physical requirements; portable PCS phones; privacy; radio port; radio system performance; roaming units; system lifetime; theft resistance; Authentication; Batteries; Cellular phones; Communication industry; Internet telephony; Monitoring; PROM; Personal communication networks; Privacy; Wires;
  • fLanguage
    English
  • Journal_Title
    Personal Communications, IEEE
  • Publisher
    ieee
  • ISSN
    1070-9916
  • Type

    jour

  • DOI
    10.1109/98.403453
  • Filename
    403453