Mobile communication security controllers

0Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cellular communication via a traditional mobile handset is a ubiquitous part of modern life and as device technology and network performance continues to advance, it becomes possible for laptop computers, Personal Digital Assistants (PDAs) and even electrical meters to better exploit mobile networks for wireless communication. As the diverse demands for network access and value added services increase, so does the importance of maintaining secure and consistent access controls. A critical and well-proven component of the Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS) security solution is the smart card in the form of the Subscriber Identity Module (SIM) or USIM, respectively. However, with the enlarged range of communications devices, some manufacturers claim that the hardware selection, chip design, operating system implementation and security concepts are different from traditional mobile phones. This has led to a suggestion that types of Software SIM should be used as an alternative to the smart card-based solution. This paper investigates the suggestion.

Cite

CITATION STYLE

APA

Mayes, K., & Markantonakis, K. (2014). Mobile communication security controllers. In Secure Smart Embedded Devices, Platforms and Applications (Vol. 9781461479154, pp. 227–266). Springer New York. https://doi.org/10.1007/978-1-4614-7915-4_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free