Skip to main content
Log in

Security in Wireless Communication

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Security is a critical issue in mobile radio applications both forthe users and providers of such systems. Although the same may besaid of all communications systems, mobile application havespecial requirements and vulnerabilities, and are therefore ofspecial concern. Emerging wireless networks share many commoncharacteristics with traditional wire-line networks such as publicswitch telephone/data networks, and hence many security issueswith the wire-line networks also apply to the wirelessenvironment. However the integration of security features intowireless communication must take into account restrictions thatmay apply to their use such as small packet size, low bandwidth,high transmission costs, limited processing and storage resourcesand real time constraints. In this paper security requirements inwireless communications along with security features in 2G and 3Gsystems are described.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. R.R. Joos and A.R. Tripathi, “Mutual Authentication in Wireless Networks”, Technical Report, Computer Science Department, University of Minnesota, 1997.

  2. D. Samfat, R. Molva and N. Asokan, “Untraceability in Mobile Networks", in Proc. of the ACMInternational Conference on Mobile Computing and Networking, Nov., 1995, pp. 26–36.

  3. P. Adhate, “Biometrics and it's Coming Role in Mobile Ecommerce”, http://www.cs.nyu.edu/ adha7755/

  4. M. Rahnema, “Overview of the GSM System and Protocol Architecture”, IEEE Communications Magazine, 1993.

  5. L. Pesonen, “GSM Interception”, 1999. http://www.dia.unisa.it/ads.dir/corso-security/www/CORSO-9900/a5/Netsec/netsec.html

  6. “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security Principles and Objectives”, 3GPP TS 33.120 Release 4.

  7. “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security Architecture”, 3GPP TS 33.102 Release 99. N. Nakajima, “Future Mobile Communications Systems in Japan”, Wireless Personal Communications, Vol. 17, Nos. 2–3, pp. 209–223, 2001.

    Google Scholar 

  8. Rehnema M., “Overview of GSM System and Protocol Architecture”, IEEE Communications Magazine, Vol. 31, pp. 92–100, 1993.

    Google Scholar 

  9. Hirose S. and Yoshida S., “A User Authentication Scheme with Identity and Location Privacy”, Proc. of 2001 Symposium on Cryptography and Information Security, pp. 619–624, Japan, Jan., 2001.

  10. Cellular Digital Packet Data (CDPD) System Specification, Release 1.0, July 1993.

  11. Molva R., Samfat D. and Tsudik G., “Authentication of Mobile Users”, IEEE Networks Special Issue in Mobile Communications, Vol. 8 (2), pp. 26–35, 1994.

    Google Scholar 

  12. Bird R., Gopal I., Herzberg A., Janson P., Kutten S., Molva R. and Yung M., “The Kryptoknight Family of Light-Weight Protocols for Authentication and Key Distribution”, IEEE/ACMTrans. on Networking,Vol.3, No. 1, pp. 31–41, 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Rahman, M.G., Imai, H. Security in Wireless Communication. Wireless Personal Communications 22, 213–228 (2002). https://doi.org/10.1023/A:1019968506856

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1019968506856

Navigation