O'Reilly logo

Wireless Security: Know It All by Jon S. Wilson, Chris Lanthem, Frank Thornton, George L Stefanek, Timothy Stapko, James F. Ransome PhD, CISM, CISSP, John Rittinghouse PhD, CISM, Stephen A. Rackley, Chris Hurley, Tony Bradley, Dan Bensky, Praphul Chandra

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 17. Security in Traditional Wireless Networks

17.1. Security in First Generation TWNs

Earlier, we discussed the Advanced Mobile Phone System (AMPS) as an example of a first-generation traditional wireless network (TWN). These networks were designed with very little security.[1] Since the AMPS radio interface was analog and since AMPS used no encryption, it was relatively simple for a radio hobbyist to intercept cellular telephone conversations with a police scanner. In the AMPS network, for the purposes of authenticating itself to the network, the mobile station sends the Electronic Serial Number (ESN) that it stores to the network. The network verifies that this is a valid ESN and then allows the subscriber access to network services. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required