Security Aspects of the Cellular Communications

2000 
At an early stage in the development of the mobile radio systems and networks, it was apparent that the weakest part of the system was the radio path. To protect the system against unauthorized use of its resources and easy eavesdropping with radio equipment, it is necessary to perform two procedures concerning authentication of the users and their equipment and ciphering the user’s information and data.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    3
    References
    1
    Citations
    NaN
    KQI
    []