You are viewing a single comment's thread from:
RE: Introduction to Mobile Networks - Security in 2G (GSM) Networks
Hi @alexdory. It's complicated when you look at the procedure as a whole but the principles are reasonably straightforward.
3G authentication is an evolution rather than a revolution. Working on that in my next post.
4G re-uses 3G authentication so that's the good news ! ;-)
Thanks for reading!