|Autor:||J. Härri, C. Bonnet||Links:||Link to Wiley/ISTE Website|
|Quelle:||Wireless and Mobile Networks Security, H. Chaouchi (Editor), M. Maknavicius (Editor), ISBN: 9781848211179, Chapter 9, pp. 315-361, June 2009.|
In this chapter, our goal is to illustrate the security mechanisms employed in mobile telecommunication networks and to emphasize the potential security breaches and related solutions guaranteeing operators and customers a secured and efficient data and infrastructure management. However, our objective is not to provide an exhaustive list of all possible known or probable security attacks but instead to address various attack classes and methods that could illegally exploit security breaches of mobile telecommunication networks.