Category: Security
5G Authentication and Key Management 5G-AKA
Secure communication in any cellular network can be achieved with help of AKA procedure. AKA is Authentication and Key Management procedure which involve mutual authentication between User Device and the […]
5G Identifiers SUPI and SUCI
In telecommunication systems, network operator allocate to each SIM card a unique identifier, known up to the 4G as an IMSI (International Mobile Subscriber Identity) and for the 5G as […]