13.07.2015 Views

ericssonhistory.com

ericssonhistory.com

ericssonhistory.com

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

signed for cellular telephony, even thoughtoday's mobile services can also be used forother purposes. On the Internet, remote authenticationdial-in user service (RADIUS)servers are <strong>com</strong>monly used for dial-up users.For electronic <strong>com</strong>merce (e-<strong>com</strong>merce), digitalcertificates are stored in databases. Ingeneral, each <strong>com</strong>munication layer belongsto a different administrative domain. Consequently,a single user often has numerousidentities and must be authorized severaltimes before he or she can use a service.While it might be possible to hide this fromthe user, by employing some kind of logonscheme, each separate authentication mustbe performed. Standard AAA protocols androaming consortiums can do away with thisproblem. Organizations that manage allthree <strong>com</strong>munication layers should be ableto bundle authentication services for theircustomers.Deploying IP securityAlthough they have not as yet been widelydeployed, mechanisms for secure IP networkshave been available for some time.IPsec was standardized in 1999, but preliminaryimplementations were availablesome years before. Similarly, TLS/SSL iswidely used on the World Wide Web.One reason for the delayed utilization ofsecurity solutions has been US export restrictions.Since a considerable share of Internetdevelopment takes place in the US,encryption has not been a top priority instandardization or in the marketing messagesof leading data <strong>com</strong>munication <strong>com</strong>panies.Today, however, the US is beginningto lift export regulations and the EuropeanUnion is increasing requirements for confidential<strong>com</strong>munications, thereby makingIP security products a necessary part of data<strong>com</strong>munication portfolios. Thus, the <strong>com</strong>mercialuse of cryptography products is increasingrapidly.Applications and productsEricsson implements IPsec in many productsincluding Tigris access servers 7 , Telebitrouters 8 , and general packet radio service(GPRS) nodes' to provide transparent andhigh-level security for many applications.Ericsson's wireless LAN (WLAN) solutionuses IPsec to encrypt airborne traffic.TLS has been used in many Web-basedapplications. In particular, a wireless applicationprotocol (WAP) variant, WTLS, willplay an important role in the future.Security in GPRS productsEricsson's serving GPRS support node(SGSN) and gateway GPRS support node(GGSN) contain full support for the IPsecFigure 8AAA servers and their relationships whenproviding IP access and services tomobile users.Ericsson Review No. 2, 2000 103

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!