You are viewing a single comment's thread from:

RE: Introduction to Mobile Networks - Security in 2G (GSM) Networks

Hi @alexdory. It's complicated when you look at the procedure as a whole but the principles are reasonably straightforward.
3G authentication is an evolution rather than a revolution. Working on that in my next post.
4G re-uses 3G authentication so that's the good news ! ;-)
Thanks for reading!

Coin Marketplace

STEEM 0.22
TRX 0.27
JST 0.041
BTC 104435.36
ETH 3867.94
SBD 3.31