TAILIEUCHUNG - GSM and UMTS (P15)

Security was perceived by some in the first days of GSM as an unnecessary expense. Certainly, initially, all involved considered protection of user data from eavesdropping as more important than authentication of the user, though some questioned whether the perceived complexity of introducing encryption over the radio interface was justified. However, as fraud losses from cloning of analogue phones rocketed in the US and the UK, as the Dutch PTT withdrew all its NMT phones so a form of authentication could be added, and as the Germans introduced simple authentication on its C-Netz system, it became apparent that authentication of. | GSM and UMTS The Creation of Global Mobile Communication Edited by Friedhelm Hillebrand Copyright 2001 John Wiley Sons Ltd ISBNs 0-470-84322-5 Hardback 0-470-845546 Electronic Chapter 15 Security Michael Walker and Tim Wright1 Introduction Security was perceived by some in the first days of GSM as an unnecessary expense. Certainly initially all involved considered protection of user data from eavesdropping as more important than authentication of the user though some questioned whether the perceived complexity of introducing encryption over the radio interface was justified. However as fraud losses from cloning of analogue phones rocketed in the US and the UK as the Dutch PTT withdrew all its NMT phones so a form of authentication could be added and as the Germans introduced simple authentication on its C-Netz system it became apparent that authentication of user identity was also very important. In recent times the security of GSM has been attacked as too weak. These criticisms are often made without knowledge of the design goals of GSM security nor the regulatory context in which the designers had to work. This section aims to show that GSM security met its design goals in a simple and elegant way and has provided more than adequate security for most of its users. Indeed GSM offers more access network security than fixed phones in most countries taking the phone to the local exchange link as the access network for fixed line systems . GSM has never been subject to the commercial cloning that was visited upon analogue NMT AMPS and TACS systems. Moreover GSM represented the first time ever that encryption functionality had been provided in a consumer device and played its part in the liberalisation of policy on encryption that today s security designers enjoy. Origins of GSM Security The security of GSM was developed by the Security Experts Group SEG which was formed by CEPT in 1984. There was a lot of concern in CEPT regarding protection of .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.