Title :
An introduction to access security in UMTS
Author_Institution :
Telenor R&D, Norway
fDate :
2/1/2004 12:00:00 AM
Abstract :
The first generation of cellular mobile communications systems contained few if any security measures to protect the system operator and users. The second generation generally did a lot better, and contained entity authentication and confidentiality protection. Although this was a major improvement, security protection in the second generation left a lot to be desired. With the advent of 3G mobile systems a serious effort has been made to create a consistent security architecture based on the threats and risks a 3G system faces.
Keywords :
3G mobile communication; telecommunication security; 3G mobile systems; UMTS; access security; cellular mobile communications systems; security architecture; system operator; users; 3G mobile communication; Authentication; Communication system security; Cryptography; GSM; Protection; Risk analysis; Robustness; Telephony; Tin;
Journal_Title :
Wireless Communications, IEEE
DOI :
10.1109/MWC.2004.1269712