Skip to main content
Log in

Security and Authentication in the Mobile World

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Mobile systems are evolving into data centric, packet switched,multiacess networks. New types of security threats are emerging in thesenew networks. From the user point of view a seamless solution for thesethreats is required. This paper presents a vision of network convergenceand its implications to authentication and authorization solutions.Security requirements are discussed and current authentication solutionsin GSM, UMTS and operator wireless local area networks (OWLAN) areintroduced. All-IP multimedia session security is discussed.Implications of AdHoc network architecture into security requirement arediscussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. 3GPP Technical Specification 33.102, “3G Security; Security Architecture”, 3GPP, 2001.

  2. http://www.ietf.org/internet-drafts/draft-haverinen-mobileip-gsmsim-02.txt.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ojanperä, T., Mononen, R. Security and Authentication in the Mobile World. Wireless Personal Communications 22, 229–235 (2002). https://doi.org/10.1023/A:1019920623694

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1019920623694

Navigation