Wireless Communications Security: Wireless Security Platforms and Functionality
by J. T. J. PenttinenResource proposed by Milena Bigatto in the book category.
Domain of interest: Technical
This chapter summarizes key aspects of wireless security platforms and their functionality. The overall secure protocols for signalling, data transfer and Subscriber Identity Module (SIM) management via, e.g., Short Message Service (SMS) and the Bearer Independent Protocol (BIP), are discussed together with the role of the SIM, Universal Integrated Circuit Card (UICC) and embedded UICC (eUICC). The chapter presents typical Over the Air (OTA) remote techniques for subscription management, including SIM OTA, as well as the Trusted Execution Environment (TEE), cloud and Host Card Emulation (HCE). The SIM OTA also works for the initiation of the subscription, remote management of files and applications, and for the overall subscription lifetime management. The TEE is located outside of the SIM/UICC but is still based on the hardware (HW) within the user device. The idea of the TEE is to divide the processing functions of the mobile equipment into normal and secure domains, or normal and secure worlds.
|Author||J. T. J. Penttinen|