This video isn’t available to you right now
Login to check your access and watch the full session
Conference
- Session
- 00:23 - 00:23
- Duration: 30 mins
- Publication date: 23 Sep 2004
- Location: IETTV_Room, IETTV_Venue, London, United Kingdom
- Part of event 2nd IEE Secure Mobile Communications Forum: Exploring the Technical Challenges in Secure GSM and WLAN
About the session
The objective of the presentation is to identify the threats to PMR systems and consider how different approaches to the implementation of cryptography and key management counter these threats when seen from the point of view of different interest groups. The presentation therefore provides an overview of the threats to PMR (Professional Mobile Radio) systems, taking into account the different potential attacker groups and the difference in the perception of the threats from the point of view of users and system operators. The presentation then goes on to look at the different options for the use of cryptography for authentication (user to network, network to user), confidentiality (air interface, or end to end) and the methods used for protection against traffic analysis. The various options are then assessed against the threats identified earlier, using examples from systems such as GSM, Tetrapol and newer interoperability standards such as FNBDT (Future Narrow Band Digital Terminal). The key management options for supporting point to point and group communications are addressed, identifying some of the problems with the different approaches that may be taken to counter the perceived threats. This includes the use of PKC (Public Key Cryptography) techniques for key management and distribution, symmetric schemes and examples of some of the problems of combined authentication and confidentiality interdependencies.