Cellular Networking

Compare the security between voice and digital data within GMS, UMTS, and 4G systems. Include:
a)what data is encrypted,
b)where in the system it is encrypted,
c)and how the data are encrypted.
d)What is the most likely type of attack and how 4G mitigates this attack?

Do not include authentication.
If you put a USIM card in your 4G LTE compatible phone, will you be able to
a)Make a voice call
b)Send a text
c)Send data

For each: why or why not (How would the connection be authenticated, or what would prevent the connection from being authenticated, and keys generated)?
Cellular infrastructure
Why do the infrastructure of all cellular networks look similar?
What changes have been made between 3G and 4G and why?
Describe the three ways cellular systems deal with user anonymity during roaming.
Compare the structure of the WPA2 authentication handshake to the 4G authentication handshake.

This question has been answered.

Get Answer