6Wireless Security Platforms and Functionality
6.1 Overview
This chapter summarizes key aspects of wireless security platforms and their functionality. First, a summary of theories is presented along with justification why each specific security mechanism is utilized. It also discusses the impacts of not deploying them in the network, SIM and other stakeholders. The SEs have been described earlier in this book, but they form an integral part of the secure platforms – both HW‐ and SW‐based options. The role of these are thus discussed further in this chapter.
The overall secure protocols for signalling, data transfer and SIM management via, e.g., SMS and the BIP, are discussed together with the role of the SIM, UICC and eUICC. This chapter presents typical OTA remote techniques for subscription management, including SIM OTA (for initiation of the subscription, subscription lifetime management, RFM, RAM, subscription management for physical users and the M2M environment), as well as the TEE, cloud and HCE. Tokenization as a basis for contactless payment is also addressed.
6.2 Forming the Base
The UICC is still one of the most secure means for authentication, authorization and encrypting the radio interface. Nevertheless, there are many available alternatives, each fitting into their optimal environment. These solutions include TEE, HCE together with the cloud concept, and tokenization, especially for mobile payments. The question is, how each stakeholder plays which part in the ...
Get Wireless Communications Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.