Rolf Blom
Ericsson
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Rolf Blom.
mobile and wireless communication networks | 2002
Rolf Blom; Elisabetta Carrara; Fredrik Lindholm; Karl Norrman; Mats Näslund
With the introduction of 3G systems multimedia applications over wireless will become widely available to the general public. One such application will be peer-to-peer conversational multimedia communication in which voice, video, still pictures and other media can be used simultaneously and in an interactive way. However, in an all IP environment it is important to have high quality and efficient security services to protect the traffic against eavesdropping and manipulations. In particular, end-to-end security is considered attractive. This paper investigates the security requirements that emerge from conversational IP multimedia applications in heterogeneous environments, with special emphasis on the requirements stemming from the wireless access. The design and the design goals of both SRTP, a security protocol for protection of media traffic, and multimedia Internet keying (MIKEY), a key management protocol specially developed for those environments, are also described.
IEEE Access | 2018
Ghada Arfaoui; Pascal Bisson; Rolf Blom; Ravishankar Borgaonkar; Håkan Englund; Edith Felix; Felix Klaedtke; Prajwol Kumar Nakarmi; Mats Näslund; Piers O'Hanlon; Juri Papay; Jani Suomalainen; Mike Surridge; Jean Philippe Wary; Alexander Zahariev
5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarization, including network function virtualization and software-defined networking. The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. It comprises a toolbox for security relevant modeling of the systems, a set of security design principles, and a set of security functions and mechanisms to implement the security controls needed to achieve stated security objectives. In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of a large number of IoT devices and network softwarization.
Archive | 2008
Rolf Blom; Gunnar Mildh; Karl Norrman
Archive | 2002
Ilkka Uusitalo; Pasi Ahonen; Rolf Blom; Boman Krister; Mats Näslund
Archive | 2002
Rolf Blom; Fredrik Lindholm; Göran Selander
Archive | 2002
Fredrik Lindholm; Rolf Blom; Karl Norrman; Göran Selander; Mats Näslund
Archive | 2002
Rolf Blom
Archive | 2004
Rolf Blom; Mats Näslund; Elisabetta Carrara; Fredrik Lindholm; Karl Norrman
Archive | 2004
Rolf Blom; Mats Näslund; Jari Arkko
Archive | 2006
Rolf Blom; Karl Norrman