|Autor:||J. Härri, C. Bonnet||Links:||Link to Wiley/ISTE Website|
|Quelle:||Wireless and Mobile Network Security, H. Chaouchi (Editor), M. Maknavicius (Editor), ISBN: 9781848211179, Chapter 11, pp. 411-434, June 2009.|
In this chapter, we will describe the various security mechanisms employed by different signaling or transmission protocols found in the so-called next generation mobile networks. Our objective is also to emphasize various security flaws and their probable malicious uses. With the strengthening of security provisions, we will also mention confidentiality and lawful interception provisions that have been required by law to all next generation mobile network actors.