The telecommunications industry's transition to Internet Protocol (IP)-Scandinavian countries, the wireless penetration rate has reached 100% [21]. The acceptance of an Internet-based service model is the only way to provide differentiated services and to increase the average revenue per user (ARPU) in an almost saturated market. Operators are focused on providing contentrich; presence-and location-based personalized services to their customers, and ring tone downloads have provided a strong indication that media will rule the new age.Given the increasing need for access to these burgeoning services, security has become a key consideration for all parties involved: end users, service providers and network operators. In current implementations, referring to a network as "secure" implies that it can protect itself from an attack on its systems.
IntroductionA massive overhaul of the telecommunications industry landscape occurred during the last decade, as some global behemoths of the previous century became marginal players or even ceased to exist. The evolution and mass acceptance of the Internet, the liberalization of the telecommunications industry, and the shifting focus from voice-to data-centric services accelerated this change.This millennium has seen the growth of the Internet and wireless in tandem. The now-ubiquitous Internet has become a dominant force in our lives. E-Commerce, e-government, media-casting, knowledge-sharing, and e-communication are striking examples of the evolutionary nature of the Internet. At the same time, wireless has actually surpassed fixed-line penetration in a few countries. In some The attack, active or passive, may involve eavesdropping, content alteration, interruption or any undesired action during and after a transaction. Common types of attacks include denial-of-service, masquerade, man-in-the-middle, and replay [9,15,16].To cope with these attacks, the industry has devised a number of mechanisms to provide secure services. These include data encryption; the implementation of a public key infrastructure (PKI) to provide a common, uniform and interoperable mechanism for sharing the keys; the use of transport layer security such as Internet Protocol security (IPSec); and the deployment of authentication, authorization and accounting (AAA) servers for user authentication