Rethinking Cellular Access Security

G.M. Køien (Norway)


Cellular Access Security; Authentication Protocols; Radio Resource Management; Mobility Management;


Access security in the 3G cellular systems is based on an evolution of 2G security. Inevitably 3G security has also inherited some 2G security weaknesses. In this paper we analyze 2G/3G security, identify inadequacies and propose an improved design.

Important Links:

Go Back