Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Secure mobile tokens - the future

Secure mobile tokens - the future

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Security for Mobility — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Secure mobile tokens are widely used in consumer products. The most popular one is the Subscriber Identity Module (SIM) security module used in GSM mobile phones. In the future, IUCC security modules would be used for 3G mobile phones. The use of secure mobile tokens in commercial environments besides mobile voice call and SMS-based services is still an emerging market. Existing security module technology will follow the technology roadmap in the near future and expand functionality and performance while still under heavy cost pressure in the consumer market. New technologies combining existing services or integrating standard Internet protocols would show up and allow for new devices and scenarios based on advance secure mobile tokens like secure multimedia card (SMMC) or secured FLASH disks. The success story of the SIM technology in GSM mobile networks is currently followed by UICC and USIM technology in 3G networks and plans exist to make use of secure mobile tokens for securing WLAN access and usage as well as to make use of it for general heterogeneous network access, regardless of it being DSL, fixed line, GSM, WLAN or Universal Mobile Telecommunications Systems (UMTS).

Inspec keywords: wireless LAN; 3G mobile communication; IP networks; consumer electronics; cellular radio; radio access networks; mobile handsets; computer network security; digital subscriber lines; multimedia communication

Other keywords: cost pressure; USIM technology; SIM technology; Internet protocols; heterogeneous network access; 3G mobile phone; mobile voice call; IUCC security module; secure multimedia card; secured flash disk; SMS-based service; DSL; secure mobile token; subscriber identity module; security module technology; consumer market; universal mobile telecommunications system; GSM mobile network; GSM mobile phone; WLAN access security; consumer product

Subjects: Mobile radio systems

Preview this chapter:
Zoom in
Zoomout

Secure mobile tokens - the future, Page 1 of 2

| /docserver/preview/fulltext/books/te/pbte051e/PBTE051E_ch5-1.gif /docserver/preview/fulltext/books/te/pbte051e/PBTE051E_ch5-2.gif

Related content

content/books/10.1049/pbte051e_ch5
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address