The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Interconnection network connects the communication networks themselves to each other enabling features such as roaming and data services between those said networks. It has been known since 2014 that using the legacy SS7 (Signaling System No. 7) protocol SMS based traffic can be intercepted. Network providers are now moving towards diameter based LTE networks with the hope that the additional...
The Diameter signaling protocol plays a critical role in mobile networks. Diameter manages a crucial function in mobile systems since it is designed for activity coordination between Internet Protocol (IP) network elements such as online charging systems, policy servers, mobility gateways among others. As operators migrate their networks to LTE, Diameter provides new services and implements more sophisticated...
User location tracking attacks using cellular networks have been known since 2008. In 2014, several Signalling System No 7 (SS7) protocol based location tracking attacks were demonstrated, which particularly targeted the cellular roaming in GSM networks. Currently, the mobile network operators are in a gradual process of upgrading to Long Term Evolution (LTE) networks, in addition to replacing SS7...
Nowadays telecommunication operators which manage various network types are looking for convergence in different domains, from the access and aggregation to the core network. Moreover, in future 5G networks, the explosion of Internet of Things and the need of fixed and mobile convergence will imply strong requirements for more simplified and unified subscriber management. This will lead notably to...
The role of cloud computing in today's world of globalization has seen major contribution for application development and deployment. Many enterprise see cloud computing as a platform for organizational and economic benefit. Cloud computing offers many businesses a new way of accessing computing services. Nevertheless, this has also exposed the organizations to a range of risks which they are unaware...
Wireless Mesh Networks (WMN) consist of a wireless infrastructure of mesh routers which are connected to the Internet via mesh gateways. Mesh clients on the other hand connect to these routers. To make full use of the connectivity and services offered by a WMN, users should be able to securely hand over from one router to the next. In particular, keying material has to be supplied to the new router...
The trusted network connect (TNC) is based on the double concepts of integrity and identity. The policy enforcement point (PEP) in TNC architecture is deeply studied and powerful broadband remote access server (BRAS) is also applied into the architecture. The new BRAS model is able to set up access control rules in accordance with the level of trust, filter traffic according to filtering rules and...
The security is a critical point to the network mobility deployment. The authentication and authorization aspects are part of the security considerations that the operators need to take into account. In a multi-operators environment, we give here an overview of some operators' recommendations and constraints relative to the AAA architecture for the NEMO networks. Then, we propose and evaluate an AAA...
With the rapid development of new networking technologies and services, and the increasing complexity of network, it is required that AAA architecture offer secure and flexible service in IPv6 scenarios. The paper proposes a secure AAA system in IPv6 network, which is based on 802.11i and diameter protocol. The system provides policy-based access control and supports heterogeneous user terminals....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.