By Topic

Secure Mobile Communications Forum: Exploring the Technical Challenges in Secure GSM and WLAN, 2004. The 2nd IEE (Ref. No. 2004/10660)

Date 23 Sept. 2004

Filter Results

Displaying Results 1 - 25 of 25
  • Contents

    Publication Year: 2004, Page(s): 0_7
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (34 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Becoming a member of the IEE

    Publication Year: 2004, Page(s): 0_6
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (41 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ISBN 0-86341-461-3 [Back Cover]

    Publication Year: 2004, Page(s): 0_19
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (12 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Copyright

    Publication Year: 2004, Page(s):0_4 - 0_5
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (58 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Back Inside Cover [blank]

    Publication Year: 2004, Page(s): 0_18
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (10 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Breaker page

    Publication Year: 2004, Page(s): 0_10
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (10 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Breaker pages

    Publication Year: 2004, Page(s):0_11 - 0_17
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (16 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Front Inside Cover [blank]

    Publication Year: 2004, Page(s): 0_2
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (10 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Breaker page

    Publication Year: 2004, Page(s): 0_8
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (10 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Breaker page

    Publication Year: 2004, Page(s): 0_9
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (10 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The 2nd IEE Secure Mobile Communications Forum:

    Publication Year: 2004, Page(s): 0_1
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (30 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The 2nd IEE Secure Mobile Communications Forum: Exploring the Technical Challenges in Secure GSM and WLAN

    Publication Year: 2004, Page(s): 0_3
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (48 KB)

    The following topics are dealt with: mobile communication; DRM; telecommunication security; cryptography; wireless LAN; and PMR networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DRM on open platforms - may be possible after all

    Publication Year: 2004, Page(s):2/1 - 2/5
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (775 KB)

    Handset development is progressing on two parallel lines. Today's phones are running various applications such as commerce, games, and data retrieval. This requires an open platform for application execution. On the other hand there is an increased need for DRM. DRM by nature requires that data is blocked by the device. Inherently, completely open platforms cannot provide means for such data block... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is CSM still secure?

    Publication Year: 2004, Page(s):3/1 - 3/4
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (521 KB)

    The security evolution of GSM to 3GSM has allowed the standards to develop, and where circumstances permit, overcome some of the potential flaws identified in GSM. As a result many safeguards have been built in to the GSM and 3 GSM technologies to prevent misuse. While the spotlight often rests on the technical threats, the reality is that the majority of threats associated with the mobile industr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The challenginc road ahead to 3G security

    Publication Year: 2004, Page(s):4/1 - 4/6
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1017 KB)

    This paper summarizes our experiences and "lessons learned" in more than 2 years of that product implementation, our understanding of the future security and performance requirements and challenges for follow-on products, and the status of our current efforts to bring those products to reality. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced mobile security in silicon

    Publication Year: 2004, Page(s):5/1 - 5/6
    Cited by:  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1044 KB)

    Mobile systems have used silicon for the root of security in the form of a subscriber Interface Module (SIM) card for many years, this use is expanding to other mobile systems and in future other consumer devices. However the growth in mobile internet transactions is leading to new demands in silicon in the SIM and the handset to provide secure mobile solutions for payment, content management and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of end to end encryption on GSM speech transmission quality - a case study

    Publication Year: 2004, Page(s):6/1 - 6/4
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (664 KB)

    A method has been developed to perform perceptual measurement of speech quality for low bit rate voice coders. This technique is suitable for quantitative measurements of speech quality provided by mobile terminals supporting end to end encryption. Analysis of speech quality not only gives a measure of the service provided to the users, it may also serve as an indication of difficulties within the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real time data transmission over GSM voice channel for secure voice and data applications

    Publication Year: 2004, Page(s):7/1 - 7/4
    Cited by:  Papers (18)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (612 KB)

    This paper describes a real time prototype implementation of a system, which enables secure voice and data communication over the GSM voice channel. The security of GSM is not guaranteed especially over the core network. The proposed system modulates digital data, which may be encrypted onto speech-like waveforms. The modulated waveform is then transmitted over the GSM voice channel, which can be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securitv assurance and standards - design for evaluation

    Publication Year: 2004, Page(s):8/1 - 8/6
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (733 KB)

    This paper presents work in progress within ETSI. The formal approach to review and evaluation as produced by ISO in (1) is being recommended to standards development. The role of standards for telecommunications deployment is often understated. The role of Common Criteria (1) has been important to allow review and assessment of the security provisions in product using standardised tools for revie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protecting future mobile access networks

    Publication Year: 2004, Page(s):9/1 - 9/4
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (702 KB)

    Mobile access networks are evolving providing more user services as the per-user bandwidth as well as the power autonomy are increasing. Security requirements are therefore becoming more demanding since important information is at stake. The absence of a hard wired channel for the transfer of data and its replacement by the air interface is the major disadvantage in terms of security of the wirele... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Threats to next generation mobile application software

    Publication Year: 2004, Page(s):10/1 - 10/3
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (506 KB)

    Next generation mobile networks and services are gaining market momentum every day. Service providers are seeking new ways to generate revenue and this is usually achieved by designing new downloadable applications that take advantage of the advanced handset technology and the higher per user bandwidth. It is therefore an ongoing challenge to protect against attackers and malicious code writers wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security considerations in PMR networks

    Publication Year: 2004, Page(s):11/1 - 11/6
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1096 KB)

    Private Mobile Radio PMR the traditional two way radio service provides a vital communication service for government and professional users. Some PMR services are similar to those provided by cellular telephony systems, such as GSM. However, some services are very different; and this leads to differences in the way that security needs to be implemented to protect the services, and ultimately the n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing airwave's future

    Publication Year: 2004, Page(s):12/1 - 12/6
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (917 KB)

    Airwave is a secure network that meets the needs of the public safety community for protecting its data. TETRA design and functionality is fundamental to this and it has a wide range of security features necessary to meet the threats posed in a digital radio communications system. All this functionality is transparent to the user who can now be assured that his transmissions are secure and the sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Threats and potential countermeasures for PMR systems

    Publication Year: 2004, Page(s):13/1 - 13/6
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (976 KB)

    The objective of the paper is to identify the threats to PMR systems and consider how different approaches to the implementation of cryptography and key management counter these threats when seen from the point of view of different interest groups. The paper therefore provides an overview of the threats to PMR (Professional Mobile Radio) systems, taking into account the different potential attacke... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vulnerability of IEEE802.11 WLANs to MAC laver DoS attacks

    Publication Year: 2004, Page(s):14/1 - 14/5
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (716 KB)

    Previously, WLAN security issues have focused upon flaws in the WEP encryption and authentication processes, Arbaugh et al (1). There exist, however, vulnerabilities in the lower layers of the protocol stack that may be easily exploited to produce denial of service attacks, Horrocks (2). One area to exploit is the medium access control (MAC) protocol that aims to ensure availability and fair shari... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.