Rethinking Cellular Access Security

G.M. Køien (Norway)

Keywords

Cellular Access Security; Authentication Protocols; Radio Resource Management; Mobility Management;

Abstract

Access security in the 3G cellular systems is based on an evolution of 2G security. Inevitably 3G security has also inherited some 2G security weaknesses. In this paper we analyze 2G/3G security, identify inadequacies and propose an improved design.

Important Links:



Go Back