Mobile communication security controllers an evaluation paper

作者: Keith E. Mayes , Konstantinos Markantonakis

DOI: 10.1016/J.ISTR.2008.09.004

关键词: Mobile WebSubscriber identity moduleTelecommunicationsGSMMobile searchMobile telephonyComputer scienceMobile computingRadio access networkPublic land mobile networkComputer Networks and CommunicationsSoftwareSafety, Risk, Reliability and Quality

摘要: Cellular communication via a traditional mobile handset is ubiquitous part of modern life and as device technology network performance continues to advance, it becomes possible for laptop computers, Personal Digital Assistants [PDAs; Note abbreviations will be shown in square brackets avoid confusion with references.] even electrical meters better exploit networks wireless communication. As the diverse demands access value added services increase, so does importance maintaining secure consistent controls. A critical well-proven component GSM UMTS security solution smart card form SIM or USIM respectively. This has also extended into some regions using variants CDMA standards where RUIM specified. However enlarged range communications devices, manufacturers claim that hardware selection, chip design, operating system implementation concept are different from phones. led suggestion types ''Software SIM'' should used an alternative based solution. paper investigates suggestion.

参考文章(14)
Markus Kuhn, Ross Anderson, Tamper resistance: a cautionary note WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2. pp. 1- 1 ,(1996)
Michel Mouly, Marie-Bernadette Pautet, Thomas Haug, The GSM System for Mobile Communications ,(1992)
Paul C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems international cryptology conference. ,vol. 1109, pp. 104- 113 ,(1996) , 10.1007/3-540-68697-5_9
Eli Biham, Adi Shamir, Differential cryptanalysis of DES-like cryptosystems international cryptology conference. ,vol. 4, pp. 2- 21 ,(1990) , 10.1007/BF00630563
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017
Keith E. Mayes, Konstantinos Markantonakis, On the potential of high density smart cards Information Security Technical Report. ,vol. 11, pp. 147- 153 ,(2006) , 10.1016/J.ISTR.2006.05.002
Paul Kocher, Joshua Jaffe, Benjamin Jun, Differential Power Analysis international cryptology conference. ,vol. 1666, pp. 388- 397 ,(1999) , 10.1007/3-540-48405-1_25
B. Sunar, D.R. Stinson, W.J. Martin, A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks IEEE Transactions on Computers. ,vol. 56, pp. 109- 119 ,(2007) , 10.1109/TC.2007.4