O'Reilly logo

Wireless Communications Security by Jyrki T. J. Penttinen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

6Wireless Security Platforms and Functionality

6.1 Overview

This chapter summarizes key aspects of wireless security platforms and their functionality. First, a summary of theories is presented along with justification why each specific security mechanism is utilized. It also discusses the impacts of not deploying them in the network, SIM and other stakeholders. The SEs have been described earlier in this book, but they form an integral part of the secure platforms – both HW‐ and SW‐based options. The role of these are thus discussed further in this chapter.

The overall secure protocols for signalling, data transfer and SIM management via, e.g., SMS and the BIP, are discussed together with the role of the SIM, UICC and eUICC. This chapter presents typical OTA remote techniques for subscription management, including SIM OTA (for initiation of the subscription, subscription lifetime management, RFM, RAM, subscription management for physical users and the M2M environment), as well as the TEE, cloud and HCE. Tokenization as a basis for contactless payment is also addressed.

6.2 Forming the Base

The UICC is still one of the most secure means for authentication, authorization and encrypting the radio interface. Nevertheless, there are many available alternatives, each fitting into their optimal environment. These solutions include TEE, HCE together with the cloud concept, and tokenization, especially for mobile payments. The question is, how each stakeholder plays which part in the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required