Securing Mobility Management Entity in Mobile Telecommunication Network
Le, Minh (2020)
Le, Minh
2020
All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-2020052814830
https://urn.fi/URN:NBN:fi:amk-2020052814830
Tiivistelmä
Mobility Management Entity is playing an indispensable role in the evolution of Evolved Packet Core – the core of the 4G LTE network architecture. This is a key control node for the Evolved Packet Core/Long-term Evolution network with many different significant functions. As the number of Mobile Telecommunication Network’s subscribers has been growing significantly, it has to deal with a huge amount of new security concerns. As a result, securing this component has developed into a serious challenge, leading to the creation of various security standards, recommendations, or frameworks.
Following this development of security, the objective of this thesis was to design a solution to appropriately secure Mobility Management Entity, contributing to securing the core of the 4G LTE network. This study was commissioned by a multinational networking and telecommunications company and consists of researching a solution to meet the security requirements and the implementation of this solution. In terms of the research method, the qualitative analysis is involved in the research process. The final result was established based on the security controls recommended by the National Institute of Standards and Technology (NIST) and the security architecture defined by the International Telecommunication Union (ITU).
Following this development of security, the objective of this thesis was to design a solution to appropriately secure Mobility Management Entity, contributing to securing the core of the 4G LTE network. This study was commissioned by a multinational networking and telecommunications company and consists of researching a solution to meet the security requirements and the implementation of this solution. In terms of the research method, the qualitative analysis is involved in the research process. The final result was established based on the security controls recommended by the National Institute of Standards and Technology (NIST) and the security architecture defined by the International Telecommunication Union (ITU).