Title :
Privacy and authentication needs of PCS
Author :
Wilkes, Joseph E.
Author_Institution :
AT&T Bell Labs., Holmdel, NJ, USA
fDate :
8/1/1995 12:00:00 AM
Abstract :
To provide the proper privacy and authentication for a PCS phone, some cryptographic system will be necessary. The article defines requirements that a cryptographic system used for PCS would need to meet. It does not attempt to define the cryptographic system. It does provide a template for examining cryptographic systems to choose between cryptographic alternatives. Some of the cryptographic requirements are in the air interface between the PCS phone and the radio port. Other requirements are on databases stored in the network and on information shared between systems in the process of handovers or giving service for roaming units. The paper first discusses four levels of privacy (including defining two new levels). Then, requirements are identified and discussed in the areas of privacy, theft resistance, radio system performance, system lifetime, physical requirements as implemented in portable/mobile PCS phones, and law enforcement needs
Keywords :
cellular radio; cryptography; data privacy; personal communication networks; PCS; air interface; authentication; cryptographic system; databases; handover; law enforcement; mobile PCS phones; physical requirements; portable PCS phones; privacy; radio port; radio system performance; roaming units; system lifetime; theft resistance; Authentication; Batteries; Cellular phones; Communication industry; Internet telephony; Monitoring; PROM; Personal communication networks; Privacy; Wires;
Journal_Title :
Personal Communications, IEEE