In this series, I’d like to have a deeper look on 4G security measures. Here we have a look at Non Access Stratum (NAS) and Access Stratum (AS) security, just after Authentication and Key Agreement Procedure (AKA) has completed.
In this series, I’d like to have a deeper look on 4G security measures. Here we look closely at step 5a in the Initial Attachment Procedure - the Authentication and Key Agreement Procedure (AKA).
In this series, I’d like to have a deeper look on 4G security measures. Here we are going to have a look on some of 4G’s cryptography, key hierarchies and which key is derived from where and how.
In this series, I’d like to have a deeper look on 4G security measures. Here we are finally going to have a look on the 4G Security Architecture and its features.
In this series, I’d like to have a deeper look on 4G security measures. In this part I’d like to start looking at the initial attachment procedure between UE and Network.
In this series, I’d like to have a deeper look on 4G security measures. In this part I’d like to start looking at the security between different 4G entities and their interfaces.