Abstract | ||
---|---|---|
CDMA 1x evolution-data optimized (1x EV-DO) is defined in the TIA/EIA IS-856 and IS-835 standards. The security of 1x EV-DO offers authentication, integrity, and encryption capabilities. 1x EV-DO supports authentication of the access terminal (AT) to authorize access to the wireless network, as well as authentication of a subscription to authorize access to the Internet Protocol (IP) network. The system also provides session security via re-authenticating the AT during a session to prevent 1x EV-DO session hijacking and to protect integrity of the user packets. This paper will outline security threats to the 1x EV-DO system, security algorithms, authentication and authorization procedures, and ciphering procedures. The 1x EV-DO security will be detailed here for key exchange, authentication, and encryption functions by supporting the following protocols: security protocol, key exchange protocol, authentication protocol, and encryption protocol. Finally, a summary of 1x EV-DO security evolution will be presented (c) 2007 Alcatel-Lucent. |
Year | DOI | Venue |
---|---|---|
2007 | 10.1002/bltj.20209 | Bell Labs Technical Journal |
Field | DocType | Volume |
IPsec,Internet security,Challenge-Handshake Authentication Protocol,Computer science,Computer security,Distributed System Security Architecture,Computer network,Security association,Authentication protocol,Protected Extensible Authentication Protocol,Network Access Control | Journal | 11 |
Issue | ISSN | Citations |
4 | 15387305 | 2 |
PageRank | References | Authors |
0.40 | 1 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Semyon Mizikovsky | 1 | 19 | 3.42 |
Zhibi Wang | 2 | 2 | 0.74 |
Hongru Zhu | 3 | 2 | 0.40 |