Tuesday 19 Jan 2021 |
This whitepaper offers a review of the security factors identified when deciding on deployment scenarios for open networking and deployment of open source software solutions within mobile networks.
Friday 18 Dec 2020 |
This report is intended to offer a summary of some of the key information sources researched, so that the reader can relatively quickly gain an overview of open source software security considerations and undertake their own research...
Friday 31 Jan 2020 |
As we enter the era of intelligent connectivity, we are seeing ever more complex networks, both in the services they offer, in the use cases they will enable, and the range of technology used to build them. Not only will such networks ...
Thursday 31 Jan 2019 |
The GSMA predict that the threat to industry will increase over time.
Sunday 27 Dec 2020 |
This document establishes high level requirements for security updates for cellular- connected device software, with a particular focus on critical security updates which need to be deployed widely and quickly due to a major security incident of some kind.
Tuesday 3 Nov 2020 |
This document provides guidelines on the security roles and responsibilities of testers and signalling interconnect partners in relation to the performance of independent remote interconnect signalling security testing as described in this document.
Friday 12 Jun 2020 |
This document provides security guidelines for the proper configuration of UICC profiles. The guidance contained in this document also applies to telecom profiles embedded into an eUICC.
Tuesday 10 Nov 2020 |
Wednesday 5 Feb 2020 | Build | Decommissioning | Design and Development | Operational |
Mobile Network Operators provide the backbone for mobile telecommunication technologies. At enterprise level the industry offers a wide array of services, diversifying from traditional connectivity into content and managed services. ...
Friday 6 Mar 2020 |
This document describes the key management process, i.e. the exchange of certificates and key materials that are used between the interconnect parties to secure the signalling communication.
Friday 6 Mar 2020 |
This document describes the GSM, UMTS, LTE and 5G authentication, privacy and integrity protection algorithms that are used in cellular devices and networks. It provides guidance and recommendations on the best deployment options as well as the algorithms