What is IMSI Catcher?
March 24, 2024

Before starting to talk about IMSI Catcher, we need to understand what is the IMSI, its importance, and its structure. Based on this, we will discuss the IMSI catcher. So let’s GO 🙂  What is IMSI? IMSI, International Mobile Subscriber Identity, is a unique static identity allocated to each subscriber in a mobile wireless system. […]

The Security Transition from 4G EPC to 5GC
March 19, 2024

If you look at how security was addressed in the 4G core (EPC), you had perimeter devices, whether it’s firewalls, security devices that protect from denial of service attacks, or just security gateways at the periphery, and you had fewer vendors addressing the core infrastructure. So, if you have a single core vendor, the risk […]

Why EAP Protocol is used in 5G Security?
November 9, 2021

The authentication procedure in 3GPP 5G security has been designed as a framework to support the Extensible Authentication Protocol (EAP) – a security protocol specified by the Internet Engineering Task Force (IETF) organization. This protocol is well established and widely used in IT environments. The advantage of this protocol is that it allows the use […]

5G Security Vs. 4G Security
July 18, 2021

5G Timeline and Standardization  During preparation, it was decided to split Phase 1 into two parts. In December 2017, standardization of the non-autonomous, or Non-Standalone, architecture for 5G New Radio (NR) was completed. This first official set of 5G standards defines the wireless air interface for interworking with existing LTE-based networks. This has allowed operators […]

The Evolution of Security in 5G
November 2, 2018

Introduction 5G will give a diverse and new set of services and use cases affecting nearly every aspect of our lives. But to exceed all expectations, 5G-enabled services and applications must be delivered securely. For example, 5G will support Massive Internet of Things (MIoT) implementations like traffic sensors and Vehicle-to-Infrastructure (V2I) services that are the […]