Wireless Communications Security: Monitoring and Protection Techniques
by J. T. J. PenttinenResource proposed by Milena Bigatto in the book category.
Domain of interest: Technical
This chapter discusses techniques for the protection of mobile communications, services, users and applications. Real time network analysis and protection techniques are summarized such as deep packet investigation, virus protection and Legal/Lawful interception (LI). The protection needs to be scalable in order to provide carrier grade IPSec throughput and performance and to minimize any network latency. The protection of the Gp/S8 interface shields the packet core network against malicious intentions regarding roaming, i.e., when users are connected to services via other mobile network operator (MNO) networks. Performance monitoring and fault management of the networks can be considered an integral part of the security assurance. LI has been designed for authorized access to the communications of commercial, government and military environments. LI provides the means for mobile and fixed network operators and service providers to collect traffic and identification information of private or organizational communications for post analysis for law enforcement officials.
|Author||J. T. J. Penttinen|