Talk With an Expert

Security Along the Path Through GPRS Towards 3G Mobile Telephone Network Data Services

Security Along the Path Through GPRS Towards 3G Mobile Telephone Network Data Services (PDF, 1.98MB)Published: 31 Jan, 2002
Created by:
Dung Chang

As wireless carriers begin to rollout GPRS networks or continue with GPRS network sustainment efforts, they must do so with security in mind. Operators must employ adequate security measures to prevent would be attackers from compromising network availability, data integrity, and information confidentiality. The standards for GPRS incorporate authentication and encryption technologies, however, sole reliance on these security standards is insufficient. Companies must think in terms of end-to-end security so that the risk of network infiltration by an unauthorized party is kept to a minimum from all access points to the GPRS network. This paper examines the technology and infrastructure that supports GPRS in a telecommunications environment, and looks at GPRS security consideration including GPRS network security and potential security threats.

Security Along the Path Through GPRS Towards 3G Mobile Telephone Network Data Services