Abstract. Protocols for authentication and key establishment have special requirements in a wireless environment. In the next generation of wireless systems it is likely that public key based protocols will be employed. There are a number of important design decisions to be made in choosing an appropriate protocol. In this paper the design requirements are reviewed and some recently proposed public key protocols for wireless communications are examined. A new public key protocol is also proposed.