Abstract

The security of mobility voice networks has traditionally been ensured by deploying point-to-point circuit-switched transport between network elements and by isolating the voice infrastructure from the public data network. However, with the introduction of new services such as Voice over Internet Protocol (VoIP) and the trend toward IP transport between network elements, this approach is no longer adequate. To guarantee the security of IP-based voice and data networks, both human-to-machine and machine-to-machine interfaces must be secured using an approach that is consistent with industry best practices, and is robust and easy to manage. This paper describes a common infrastructure for managing network element security, encompassing both CDMA2000 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">∗</sup> 1x and CDMA2000 1x evolution data optimized (1x EV-DO) networks that contain hundreds of individual network elements. The architecture provides a common, centralized infrastructure for security management, including configuration management, data audits, logging, and key distribution. The networks are secured against both internal and external threats by addressing standard security dimensions such as authentication, privacy, non-repudiation, and access control. © 2007 Alcatel-Lucent.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.