Secure Communication Over the Cellular NetworkThe evolution of the cellular network has allowed much higher connectivity but increased the vulnerability to interception. Secure transmission over the cellular network is possible if the modem and crypto can handle the sudden change in path delay that occurs at cell handoff. The required changes to allow this operation are relatively straightforward. The modern must incorporate a Quality Monitor to determine whether the received data should be used for adaptation. The crypto must provide for detection of loss is synchronization and allow rapid resynchronization.
View Entire Paper | Previous Page | White Papers Search
If you found this page useful, bookmark and share it on: