Mobile communication security controllers an evaluation paper

  • Authors:
  • Keith E. Mayes;Konstantinos Markantonakis

  • Affiliations:
  • Information Security Group Smart Card Centre, Royal Holloway, University of London, Egham, Surrey England, UK;Information Security Group Smart Card Centre, Royal Holloway, University of London, Egham, Surrey England, UK

  • Venue:
  • Information Security Tech. Report
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Cellular communication via a traditional mobile handset is a ubiquitous part of modern life and as device technology and network performance continues to advance, it becomes possible for laptop computers, Personal Digital Assistants [PDAs; Note abbreviations will be shown in square brackets to avoid confusion with references.] and even electrical meters to better exploit mobile networks for wireless communication. As the diverse demands for network access and value added services increase, so does the importance of maintaining secure and consistent access controls. A critical and well-proven component of the GSM and UMTS security solution is the smart card in the form of the SIM or USIM respectively. This has also extended into some regions using variants of CDMA standards where the RUIM is specified. However with the enlarged range of communications devices, some manufacturers claim that the hardware selection, chip design, operating system implementation and security concept are different from traditional mobile phones. This has led to a suggestion that types of ''Software SIM'' should be used as an alternative to the smart card based solution. This paper investigates the suggestion.