E-mail a Wiley Online Library Link

Eric Southern, Abdelkader Ouda and Abdallah Shami Wireless security: securing mobile UMTS communications from interoperation of GSM Security and Communication Networks 6

Article first published online: 17 DEC 2012 | DOI: 10.1002/sec.674

Thumbnail image of graphical abstract

Two changes to the mobile networks security protocols have been proposed to protect against the legacy integration of global system for mobile communication (GSM). The former utilize a strong hash function to protect the secret key used in the GSM protocol. This will protect the GSM key from attackers and therefore, protect the universal mobile telecommunications system (UMTS) communication that depends on the keys devised from this GSM secret key. The later change is for the UMTS protocol to protect the key derivation process in UMTS so that if the secret key in GSM is compromised, still the secret keys used in UMTS are protected and unaffected.

Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf

Required = Required Field