Digital Enhanced Cordless Telecommunications
This article needs additional citations for verification. (March 2009) (Learn how and when to remove this template message)
Digital Enhanced Cordless Telecommunications (Digital European Cordless Telecommunications), usually known by the acronym DECT, is a standard primarily used for creating cordless telephone systems. It originated in Europe, where it is the universal standard, replacing earlier cordless phone standards, such as 900 MHz CT1 and CT2.
Beyond Europe, it has been adopted by Australia, and most countries in Asia and South America. North American adoption was delayed by United States radio frequency regulations. This forced development of a variation of DECT, called DECT 6.0, using a slightly different frequency range which makes these units incompatible with systems intended for use in other areas, even from the same manufacturer. DECT has almost universally replaced other standards in most countries where it is used, with the exception of North America.
DECT was originally intended for fast roaming between networked base stations and the first DECT product was Net3 wireless LAN. However, its most popular application is single-cell cordless phones connected to traditional analog telephone, primarily in home and small office systems, though gateways with multi-cell DECT and/or DECT repeaters are also available in many private branch exchange (PBX) systems for medium and large businesses produced by Panasonic, Mitel, Gigaset, Snom, BT Business, RTX Telecom, and Spectralink. DECT can also be used for purposes other than cordless phones, such as baby monitors and industrial sensors. DECT ULE is a variant tailored for home security and automation.
The DECT standard includes the generic access profile (GAP), a common interoperability profile for simple telephone capabilities, which most manufacturers implement. GAP-conformance enables DECT handsets and bases from different manufacturers to interoperate at the most basic level of functionality, that of making and receiving calls.
New Generation DECT (NG-DECT) standard, marketed as CAT-iq by the DECT Forum, provides a common set of advanced capabilities for handsets and base stations. CAT-iq allows interchangeability across base stations and handsets from different manufacturers, while maintaining backward-compatibility with GAP equipment. It also requires mandatory support for wideband audio.
- 1 Standards history
- 2 Application
- 3 DECT 6.0
- 4 NG-DECT/CAT-iq
- 5 Technical features
- 6 DECT for data networks
- 7 Health and safety
- 8 See also
- 9 References
- 10 Standards
- 11 Further reading
- 12 External links
The DECT standard was developed by ETSI in several phases, the first of which took place between 1988 and 1992 when the first round of standards were published. These were the ETS 300-175 series in nine parts defining the air interface, and ETS 300-176 defining how the units should be type approved. A technical report, ETR-178, was also published to explain the standard. Subsequent standards were developed and published by ETSI to cover interoperability profiles and standards for testing.
Named Digital European Cordless Telephone at its launch by CEPT in November 1987; its name was soon changed to Digital European Cordless Telecommunications, following a suggestion by Enrico Tosato of Italy, to reflect its broader range of application including data services. In 1995, due to its more global usage, the name was changed from European to Enhanced. DECT is recognized by the ITU as fulfilling the IMT-2000 requirements and thus qualifies as a 3G system. Within the IMT-2000 group of technologies, DECT is referred to as IMT-2000 Frequency Time (IMT-FT).
DECT was developed by ETSI but has since been adopted by many countries all over the World. The original DECT frequency band (1880–1900 MHz) is used in all countries in Europe. Outside Europe, it is used in most of Asia, Australia and South America. In the United States, the Federal Communications Commission in 2005 changed channelization and licensing costs in a nearby band (1920–1930 MHz, or 1.9 GHz), known as Unlicensed Personal Communications Services (UPCS), allowing DECT devices to be sold in the U.S. with only minimal changes. These channels are reserved exclusively for voice communication applications and therefore are less likely to experience interference from other wireless devices such as baby monitors and wireless networks.
The New Generation DECT (NG-DECT) standard was first published in 2007; it was developed by ETSI with guidance from the Home Gateway Initiative through the DECT Forum. The ETSI TS 102 527 series comes in five parts and covers wideband audio and mandatory interoperability features. They were preceded by an explanatory technical report, ETSI TR 102 570. The DECT Forum maintains the CAT-iq trademark and certification program; CAT-iq wideband voice profiles 1.0 and 2.0/2.1 are based on the relevant parts of ETSI TS 102 527.
The DECT Ultra Low Energy (DECT ULE) standard was announced in January 2011 and the first commercial products were launched later that year by Dialog Semiconductor. The standard was created to enable home automation, security, healthcare and energy monitoring applications that are battery powered. Like DECT, DECT ULE standard uses the 1.9 GHz band, and so suffers less interference than Zigbee, Bluetooth, or Wi-Fi from microwave ovens, which all operate in the unlicensed 2.4 GHz ISM band. DECT ULE uses a simple star network topology, so many devices in the home are connected to a single control unit.
Future revisions of the standard (tentatively termed DECT-2020) are expected to include high reliability low-latency DECT ULE for industry machine-to-machine application, high bitrate ultra reliable low latency protocols for professional wireless audio applications using point-to-point or multicast communications, high-throughput QAM-256 modulation; a long term evolution to OFDM (downlink) and OFDMA/SC-FDMA (uplink) modulation with a downlink rate of 1 Gbit/s (tentatively termed DECT 5G) is being researched by the ETSI DECT committee. The effort aims to adopt the updated DECT protocols into the upcoming IMT-2020 standard, which defines Ultra-Reliable Low-Latency Communications (URLLC), Massive Machine Type Communications (MMTC), and enhanced Mobile Broadband (eMBB) services.
OpenD is an open-source framework designed to provide a complete software implementation of DECT ULE protocols on reference hardware from Dialog Semiconductor and DSP Group; the project is maintained by the DECT forum.
The DECT standard originally envisaged three major areas of application:
- Domestic cordless telephony, using a single base station to connect one or more handsets to the public telecommunications network.
- Enterprise premises cordless PABXs and wireless LANs, using many base stations for coverage. Calls continue as users move between different coverage cells, through a mechanism called handover. Calls can be both within the system and to the public telecommunications network.
- Public access, using large numbers of base stations to provide high capacity building or urban area coverage as part of a public telecommunications network.
Of these, the domestic application (cordless home telephones) has been extremely successful. The enterprise PABX market had some success, and all the major PABX vendors have offered DECT access options. The public access application did not succeed, since public cellular networks rapidly out-competed DECT by coupling their ubiquitous coverage with large increases in capacity and continuously falling costs. There has been only one major installation of DECT for public access: in early 1998 Telecom Italia launched a wide-area DECT network known as "Fido" after much regulatory delay, covering major cities in Italy. The service was promoted for only a few months and, having peaked at 142,000 subscribers, was shut down in 2001.
DECT has also been used for wireless local loop as a substitute for copper pairs in the "last mile" in countries such as India and South Africa. By using directional antennas and sacrificing some traffic capacity, cell coverage could extend to over 10 kilometres (6.2 mi). One example is the corDECT standard.
The first data of DECT was Net3 wireless LAN system by Olivetti, launched in 1993 and discontinued in 1995. A precursor to Wi-Fi, Net3 was a micro-cellular data-only network with fast roaming between base stations and 520 kbit/s transmission rates.
Data applications such as electronic cash terminals, traffic lights, and remote door openers also exist, but have been eclipsed by Wi-Fi, 3G and 4G which compete with DECT for both voice and data.
DECT 6.0 is a North American variation of DECT, operating at 1.9 GHz. The DECT and DECT 6.0 technologies are essentially identical, except for operating frequency.
The "6.0" does not equate to a spectrum band, but is a marketing term coined by Rick Krupka while at Siemens for DECT devices manufactured for use in the United States and Canada. It was decided the term DECT 1.9 might have confused customers who equate larger numbers (such as the 2.4 and 5.8 in existing 2.4 GHz and 5.8 GHz cordless telephones) with later products.
In North America, DECT suffers from major deficits, especially in comparison to DECT elsewhere, since the UPCS band (1920–1930 MHz) used for DECT in North America is not free from heavy interference and only half as wide as that used in Europe (1880–1900 MHz), the 4 mW average transmission power limits the range to far less than the 10 mW permitted in Europe, and the commonplace lack of GAP compatibility among US vendors binds companies to a single vendor.
Before 1.9 GHz band was approved by the FCC in 2005, DECT could only operate in unlicensed Region 2 2.4 GHz and 900 MHz ISM bands; some users of Uniden WDECT 2.4 GHz phones reported interoperablity issues with Wi-Fi equipment.[unreliable source?]
North-American DECT 6.0 products may not be used in Europe, Sri Lanka and Africa, as they cause and suffer from interference with the European, Sri Lankan and South African cellular networks. Use of such products is prohibited by European Telecommunications Authorities, Telecommunications Regulatory Commission of Sri Lanka and the Independent Communication Authority of South Africa. European DECT products may not be used in the United States and Canada, as they likewise cause and suffer from interference with American and Canadian cellular networks, and use is prohibited by the Federal Communication Commission and Industry Canada.
Cordless Advanced Technology—internet and quality (CAT-iq) is a certification program maintained by the DECT Forum. It is based on New Generation DECT (NG-DECT) series of standards from ETSI.
NG-DECT/CAT-iq contains features that expand the generic GAP profile with mandatory support for high quality wideband voice, enhanced security, calling party identification, multiple lines, parallel calls, and similar functions to facilitate VoIP calls through SIP and H.323 protocols.
There are several CAT-iq profiles which define supported voice features:
- CAT-iq 1.0 – "HD Voice" (ETSI TS 102 527-1): wideband audio, calling party line and name identification (CLIP/CNIP)
- CAT-iq 2.0 – "Multi Line" (ETSI TS 102 527-3): multiple lines, call waiting, call transfer, call intrusion, phonebook, caller list
- CAT-iq 2.1 – "Green" (ETSI TS 102 527-5): 3-party conference, call intrusion, caller blocking (CLIR), answering machine control, SMS, power-management
- CAT-iq Data – light data services, software upgrade over the air (SUOTA) (ETSI TS 102 527-4)
- CAT-iq IOT – Smart Home connectivity (IOT) with DECT Ultra Low Energy (ETSI TS 102 939)
CAT-iq allows any DECT handset to communicate with a DECT base from a different vendor, providing full interoperability. CAT-iq 2.0/2.1 feature set is designed to support IP-DECT base stations found in office IP-PBX and home gateways.
The DECT standard specifies a means for a portable phone or "Portable Part" to access a fixed telephone network via radio. Base station or "Fixed Part" is used to terminate the radio link and provide access to a fixed line. A gateway is then used to connect calls to the fixed network, such as public switched telephone network (telephone jack), office PBX, ISDN, or VoIP over Ethernet connection.
Typical abilities of a domestic DECT Generic Access Profile (GAP) system include multiple handsets to one base station and one phone line socket. This allows several cordless telephones to be placed around the house, all operating from the same telephone jack. Additional handsets have a battery charger station that does not plug into the telephone system. Handsets can in many cases be used as intercoms, communicating between each other, and sometimes as walkie-talkies, intercommunicating without telephone line connection.
DECT operates in the 1880–1900 MHz band and defines ten frequency channels from 1881.792 MHz to 1897.344 MHz with a band gap of 1728 kHz.
DECT operates as a multicarrier frequency division multiple access (FDMA) and time division multiple access (TDMA) system. This means that the radio spectrum is divided into physical carriers in two dimensions: frequency and time. FDMA access provides up to 10 frequency channels, and TDMA access provides 24 time slots per every frame of 10 ms. DECT uses time division duplex (TDD), which means that down- and uplink use the same frequency but different time slots. Thus a base station provides 12 duplex speech channels in each frame, with each time slot occupying any available channel – thus 10 × 12 = 120 carriers are available, each carrying 32 kbit/s.
DECT also provides frequency-hopping spread spectrum over TDMA/TDD structure for ISM band applications. If frequency-hopping is avoided, each base station can provide up to 120 channels in the DECT spectrum before frequency reuse. Each timeslot can be assigned to a different channel in order to exploit advantages of frequency hopping and to avoid interference from other users in asynchronous fashion.
DECT allows interference-free wireless operation to around 100 metres (110 yd) outdoors, much less indoors when separated by walls. Operates clearly in common congested domestic radio traffic situations, for instance, generally immune to interference from other DECT systems, Wi-Fi networks, video senders, Bluetooth technology, baby monitors and other wireless devices.
ETSI standards documentation ETSI EN 300 175 parts 1–8 (DECT), ETSI EN 300 444 (GAP) and ETSI TS 102 527 parts 1–5 (NG-DECT) prescribe the following technical properties:
- Audio codec:
- Frequency: the DECT physical layer specifies RF carriers for the frequency ranges 1880 MHz to 1980 MHz and 2010 MHz to 2025 MHz, as well as 902 MHz to 928 MHz and 2400 MHz to 2483,5 MHz ISM band with frequency-hopping for the U.S. market. The most common spectrum allocation is 1880 MHz to 1900 MHz; outside Europe, 1900 MHz to 1920 MHz and 1910 MHz to 1930 MHz spectrum is available in several countries.
- 1880–1900 MHz in Europe, as well as South Africa, Asia, Hong Kong, Australia, and New Zealand
- 1786–1792 MHz in Korea
- 1880–1895 MHz in Taiwan
- 1893–1906 MHz (J-DECT) in Japan
- 1900–1920 MHz in China (until 2003)
- 1910–1920 MHz in Brazil
- 1910–1930 MHz in Latin America
- 1920–1930 MHz (DECT 6.0) in the United States and Canada
- Carriers (1.728 MHz spacing):
- 10 channels in Europe and Latin America
- 8 channels in Taiwan
- 5 channels in the US, Brazil, Japan
- 3 channels in Korea
- Time slots: 2 × 12 (up and down stream)
- Channel allocation: dynamic
- Average transmission power: 10 mW (250 mW peak) in Europe & Japan, 4 mW (100 mW peak) in the US
The DECT physical layer uses FDMA/TDMA access with TDD.
Gaussian frequency-shift keying (GFSK) modulation is used: the binary one is coded with a frequency increase by 288 kHz, and the binary zero with frequency decrease of 288 kHz. With high quality connections, 2-, 4- or 8-level Differential BPSK modulation (DBPSK, DQPSK or D8PSK), which is similar to QAM-2, QAM-4 and QAM-8, can be used to transmit 1, 2, or 3 bits per each symbol. QAM-16 and QAM-64 modulations with 4 and 8 bits per symbol can be used for user data (B-field) only, with resulting transmission speeds of up to 5,068 Mbit/s.
DECT provides dynamic channel selection and assignment; the choice of transmission frequency and time slot is always made by the mobile terminal. In case of interference in the selected frequency channel, the mobile terminal (possibly from suggestion by the base station) can initiate either intracell handover, selecting another channel/transmitter on the same base, or intercell handover, selecting a different base station altogether. For this purpose, DECT devices scan all idle channels at regular 30 s intervals to generate a received signal strength indication (RSSI) list. When a new channel is required, the mobile terminal (PP) or base station (FP) selects a channel with the minimum interference from the RSSI list.
The maximum allowed power for portable equipment as well as base stations is 250 mW. A portable device radiates an average of about 10 mW during a call as it is only using one of 24 time slots to transmit. In Europe, the power limit was expressed as effective radiated power (ERP), rather than the more commonly used equivalent isotropically radiated power (EIRP), permitting the use of high-gain directional antennas to produce much higher EIRP and hence long ranges.
GFSK modulation uses a bit rate of 1152 kbit/s, with a frame of 10 ms (11520 bits) which contains 24 time slots. Each slots contains 480 bits, some of which are reserved for physical packets and the rest is guard space. Slots 0–11 are always used for downlink (FP to PP) and slots 12–23 are used for uplink (PP to FP).
There are several combinations of slots and corresponding types of physical packets with GFSK modulation:
- Basic packet (P32) – 420 or 424 bits "full slot", used for normal speech transmission. User data (B-field) contains 320 bits.
- Low-capacity packet (P00) – 96 bits at the beginning of the time slot ("short slot"). This packet only contains 64-bit header (A-field) used as a dummy bearer to broadcast base station identification when idle.
- Variable capacity packet (P00j) – 100 + j or 104 + j bits, either two half-slots (0 ≤ j ≤ 136) or "long slot" (137 ≤ j ≤ 856). User data (B-field) contains j bits.
- P64 (j = 640), P67 (j = 672) – "long slot", used by NG-DECT/CAT-iq wideband voice and data.
- High-capacity packet (P80) – 900 or 904 bits, "double slot". This packet uses two time slots and always begins in an even time slot. The B-field is increased to 800 bits..
The 420/424 bits of a GFSK basic packet (P32) contain the following fields:
- 32 bits – synchronization code (S-field): constant bit string AAAAE98AH for FP transmission, 55551675H for PP transmission
- 388 bits – data (D-field), including
- 64 bits – header (A-field): control traffic in logical channels C, M, N, P, and Q
- 320 bits – user data (B-field): DECT payload, i.e. voice data
- 4 bits – error-checking (X-field): CRC of the B-field
- 4 bits – collision detection/channel quality (Z-field): optional, contains a copy of the X-field
The resulting full data rate is 32 kbit/s, available in both directions.
The DECT network layer always contains the following protocol entities:
- Call Control (CC)
- Mobility Management (MM)
Optionally it may also contain others:
- Call Independent Supplementary Services (CISS)
- Connection Oriented Message Service (COMS)
- Connectionless Message Service (CLMS)
All these communicate through a Link Control Entity (LCE).
The mobility management protocol includes the management of identities, authentication, location updating, on-air subscription and key allocation. It includes many elements similar to the GSM protocol, but also includes elements unique to DECT.
Unlike the GSM protocol, the DECT network specifications do not define cross-linkages between the operation of the entities (for example, Mobility Management and Call Control). The architecture presumes that such linkages will be designed into the interworking unit that connects the DECT access network to whatever mobility-enabled fixed network is involved. By keeping the entities separate, the handset is capable of responding to any combination of entity traffic, and this creates great flexibility in fixed network design without breaking full interoperability.
DECT GAP is an interoperability profile for DECT. The intent is that two different products from different manufacturers that both conform not only to the DECT standard, but also to the GAP profile defined within the DECT standard, are able to interoperate for basic calling. The DECT standard includes full testing suites for GAP, and GAP products on the market from different manufacturers are in practice interoperable for the basic functions.
The DECT media access control layer includes authentication of handsets to the base station using the DECT Standard Authentication Algorithm (DSAA). When registering the handset on the base, both record a shared 128-bit Unique Authentication Key (UAK). The base can request authentication by sending two random numbers to the handset, which calculates the response using the shared 128-bit key. The handset can also request authentication by sending a 64-bit random number to the base, which chooses a second random number, calculates the response using the shared key, and sends it back with the second random number.
The standard also provides encryption services with the DECT Standard Cipher (DSC). The encryption is fairly weak, using a 35-bit initialization vector and encrypting the voice stream with 64-bit encryption. While most of the DECT standard is publicly available, the part describing the DECT Standard Cipher was only available under a non-disclosure agreement to the phones' manufacturers from ETSI.
The properties of the DECT protocol make it hard to intercept a frame, modify it and send it later again, as DECT frames are based on time-division multiplexing and need to be transmitted at a specific point in time. Unfortunately very few DECT devices on the market implemented authentication and encryption procedures  – and even when encryption was used by the phone, it was possible to implement a man-in-the-middle attack impersonating a DECT base station and revert to unencrypted mode – which allows calls to be listened to, recorded, and re-routed to a different destination.
After an unverified report of a successful attack in 2002, members of the deDECTed.org project actually did reverse engineer the DECT Standard Cipher in 2008, and as of 2010 there has been a viable attack on it that can recover the key.
In 2012, an improved authentication algorithm, the DECT Standard Authentication Algorithm 2 (DSAA2), and improved version of the encryption algorithm, the DECT Standard Cipher 2 (DSC2), both based on AES 128-bit encryption, were included as optional in the NG-DECT/CAT-iq suite.
DECT Forum also launched the DECT Security certification program which mandates the use of previously optional security features in the GAP profile, such as early encryption and base authentication.
Various access profiles have been defined in the DECT standard:
- Public Access Profile (PAP) (deprecated)
- Generic Access Profile (GAP)
- Cordless Terminal Mobility (CTM) Access Profile (CAP)
- Data access profiles
- DECT Packet Radio System (DPRS)
- DECT Multimedia Access Profile (DMAP)
- Multimedia in the Local Loop Access Profile (MRAP)
- Open Data Access Profile (ODAP)
- Radio in the Local Loop (RLL) Access Profile (RAP)
- Internetworking profiles (IWP)
DECT for data networks
Other interoperability profiles exist in the DECT suite of standards, and in particular the DPRS (DECT Packet Radio Services) bring together a number of prior interoperability profiles for the use of DECT as a wireless LAN and wireless internet access service. With good range (up to 200 metres (660 ft) indoors and 6 kilometres (3.7 mi) using directional antennae outdoors), dedicated spectrum, high interference immunity, open interoperability and data speeds of around 500 kbit/s, DECT appeared at one time to be a superior alternative to Wi-Fi. The protocol capabilities built into the DECT networking protocol standards were particularly good at supporting fast roaming in the public space, between hotspots operated by competing but connected providers. The first DECT product to reach the market, Olivetti's Net3, was a wireless LAN, and German firms Dosch & Amand and Hoeft & Wessel built niche businesses on the supply of data transmission systems based on DECT.
However, the timing of the availability of DECT, in the mid-1990s, was too early to find wide application for wireless data outside niche industrial applications. Whilst contemporary providers of Wi-Fi struggled with the same issues, providers of DECT retreated to the more immediately lucrative market for cordless telephones. A key weakness was also the inaccessibility of the U.S. market, due to FCC spectrum restrictions at that time. By the time mass applications for wireless Internet had emerged, and the U.S. had opened up to DECT, well into the new century, the industry had moved far ahead in terms of performance and DECT's time as a technically competitive wireless data transport had passed.
Health and safety
DECT uses UHF radio, similar to mobile phones, baby monitors, Wi-Fi, and other cordless telephone technologies. The UK Health Protection Agency (HPA) claims that due to a mobile phone's adaptive power ability, a DECT cordless phone's radiation could actually exceed the radiation of a mobile phone. A DECT cordless phone's radiation has an average output power of 10 mW but is in the form of 100 bursts per second of 250 mW, a strength comparable to some mobile phones. Most studies have been unable to demonstrate any link to health effects, or have been inconclusive. Electromagnetic fields may have an effect on protein expression in laboratory settings but have not yet been demonstrated to have clinically significant effects in real-world settings. The World Health Organization has issued a statement on medical effects of mobile phones which acknowledges that the longer term effects (over several decades) require further research.
- Cordless telephone
- Generic access profile (GAP)
- GSM Interworking Profile (GIP)
- CT2 (DECT's predecessor in Europe)
- Unlicensed Personal Communications Services
- Wireless local loop
- "DECT Information". 2.rohde-schwarz.com. Retrieved 2 January 2018.
- "ETSI TR 101 178 V1.5.1 (2005-02). Digital Enhanced Cordless Telecommunications (DECT): A high level guide to the DECT standardization" (PDF). Etsi.org. Retrieved 2 January 2018.
- "DECT reaches a New Generation". Etsi.org. Retrieved 2 January 2018.
- "DECT Issue 006 – October 2016". Dect.org. Retrieved 2 January 2018.
- "ETSI TR 102 570 V1.1.1 (2007-03). Digital Enhanced Cordless Telecommunications (DECT); New Generation DECT; Overview and Requirements" (PDF). Etsi.org. Retrieved 2 January 2018.
- ETSI TR 103 422 V1.1.1 (2017-06): Requirements and technical analysis for the further evolution of DECT and DECT ULE
- DECT Today (May 2018)
- DECT for Cordless Terminal Mobility. DECT Forum Newsletter. 6 March 1998
- "La TELECOM spegne "Fido" – 5 aprile 2000". Angelodenicola.it. Retrieved 2 January 2018.
- Schuler, Andreas; Tews, Erik; Weinmann, Ralf-Philipp (29 December 2008). "What is DECT?" (PDF). deDECTed.org. Archived from the original (PDF) on 5 October 2016. Retrieved 15 September 2016.
- "WDECT Phone review". Archived from the original on 27 February 2009. Retrieved 3 June 2018.
- Example of WI-FI and WDECT problems
- Daily Mirror. "TRC Seizes Wireless Phones". Daily Mirror. Retrieved 8 July 2017.
- TRCSL. "The Use of DECT 6.0 Phones is illegal in Sri Lanka". TRCSL. TRCSL. Retrieved 8 July 2017.
- "DECT Today, Issue 8". Newsletter.insight5.nl. October 2017. p. 16. Retrieved 2 January 2018.
- S, Rappaport Theodore (September 2010). Wireless Communications: Principles And Practice, 2/E. Pearson Education. p. 587. ISBN 978-81-317-3186-4.
- "Beware of Buying Radiocommunications Equipment not Meeting Prescribed Specifications". Office of the Communications Authority.
- Dr. DECT Secturity: Present, Past, Future. DECT World 2016 Presentations. Erik Tews, University of Birmingham. 31 May 2016.
- "Serious security vulnerabilities in DECT wireless telephony". Heise Online. 29 December 2008.
- Lucks, Stefan; Schuler, Andreas; Tews, Erik; Weinmann, Ralf-Philipp; Wenzel, Matthias. Attacks on the DECT Authentication Mechanisms. Fischlin, Marc (Ed.): Topics in Cryptology – CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20–24, 2009.
- Erik Tews. DECT Security Analysis (Ph.D. Thesis). Technische Universität Darmstadt
- "Do you like ice cream?". Groups.google.com. Newsgroup: alt.anonymous.messages. Usenet: email@example.com. Retrieved 2 January 2018.
- Weinmann, Ralf-Philipp (26 January 2009). "DSC – Reverse Engineering of the Samsung DECT SP-R6150". Archived from the original on 26 February 2012.
- Nohl, Karsten; Tews, Erik; Weinmann, Ralf-Philipp (4 April 2010). "Cryptanalysis of the DECT Standard Cipher" (PDF). Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea.
- "Wireless LANs: developments in technology and standards". IEE Journal of Computing and Control Engineering. October 1994.
- Independent Advisory Group on Non-ionising Radiation (April 2012). "Health Effects from Radiofrequency Electromagnetic Fields". (UK) Health Protection Agency. Retrieved 10 September 2013.
- Vitreous State Laboratory, Catholic University of America, Washington, DC 20064, USA. "Chronic electromagnetic field exposure decreases HSP70 levels and lowers cytoprotection". (US) Wiley-Liss, Inc. PMID 11813250.
- "What are the health risks associated with mobile phones and their base stations?". Online Q&A. World Health Organization. 5 December 2005. Retrieved 19 January 2008.
- ETSI EN 300 175 V2.7.1 (2017-11). Digital Enhanced Cordless Telecommunications (DECT) – Common Interface (CI)
- ETSI EN 300 175-1. Part 1: Overview
- ETSI EN 300 175-2. Part 2: Physical Layer (PHL)
- ETSI EN 300 175-3. Part 3: Medium Access Control (MAC) layer
- ETSI EN 300 175-4. Part 4: Data Link Control (DLC) layer
- ETSI EN 300 175-5. Part 5: Network (NWK) layer
- ETSI EN 300 175-6. Part 6: Identities and addressing
- ETSI EN 300 175-7. Part 7: Security features
- ETSI EN 300 175-8. Part 8: Speech and audio coding and transmission
- ETSI TS 102 939 (2017-10). Digital Enhanced Cordless Telecommunications (DECT) – Ultra Low Energy (ULE) – Machine to Machine Communications
- ETSI TS 102 939-1 V1.3.1. Part 1: Home Automation Network (phase 1)
- ETSI TS 102 939-2 V1.2.1. Part 2: Home Automation Network (phase 2)
- ETSI TS 102 527. Digital Enhanced Cordless Telecommunications (DECT) – New Generation DECT
- ETSI TS 102 527-1 V1.4.1 (2014-04). Part 1: Wideband speech
- ETSI TS 102 527-2 V1.1.1 (2007-06). Part 2: Support of transparent IP packet data
- ETSI TS 102 527-3 V1.6.1 (2014-01). Part 3: Extended wideband speech services
- ETSI TS 102 527-4 V1.3.1 (2015-11). Part 4: Light Data Services; Software Update Over The Air (SUOTA), content downloading and HTTP based applications
- ETSI TS 102 527-5 V1.2.1 (2014-01). Part 5: Additional feature set nr. 1 for extended wideband speech services
- Digital Enhanced Cordless Telecommunications (DECT)
- ETSI EN 300 444 V2.5.1 (2017-10). Generic Access Profile (GAP)
- ETSI EN 300 824 V1.3.1 (2001-08). Cordless Terminal Mobility (CTM) – CTM Access Profile (CAP)
- ETSI EN 300 700 V2.1.1 (2016-11). Wireless Relay Station (WRS)
- ETSI EN 301 649 V2.3.1 (2015-03). DECT Packet Radio Service (DPRS)
- ETSI EN 300 757 V1.5.1 (2004-09). Low Rate Messaging Service (LRMS) including Short Messaging Service (SMS)
- Digital Enhanced Cordless Telecommunications (DECT) – New Generation DECT
- ETSI TS 102 841 V1.5.1 (2014-01). Extended wideband speech services – Profile Test Specification (PTS) and Test Case Library (TCL)
- ETSI TS 102 843 V1.1.1 (2014-01). Additional feature set nr.1 for extended wideband speech services; Profile Test Specification (PTS) and Test Case Library (TCL)
- ETSI TS 103 158 V1.1.1 (2014-11). Light Data Services – Software Update Over The Air (SUOTA) – Profile Test Specification (PTS) and Test Case Library (TCL)
- Tuttlebee, Wally H.W. (1996). Cordless Telecommunications Worldwide. Springer. ISBN 978-3-540-19970-0.
- Phillips, John A.; Mac Namee, Gerard (1998). Personal Wireless Communication with DECT and PWT. Artech. ISBN 978-0-89006-872-4.
- Prof. Dr. W. Kowalk (13 March 2007). "Rechnernetze – The DECT Standard". Retrieved 2008-12-29.
- Technical Report: Multicell Networks based on DECT and CAT-iq. Dosch & Amand Research
|Wikimedia Commons has media related to DECT telephones.|