DIAMETER-Based Accounting and Policy Management Critical for Accurate Billing in Shared LTE Network, says Stoke

Stoke, the leading security developer for mobile networks, in a statement said that it is critical to protect and encrypt each partner's traffic in a shared LTE network. As the LTE network sharing is on the rise due to market forces and regulators pushing for greater penetration of broadband, Stoke added that DIAMETER-Based Accounting and Policy Management defuses new risks and enables accurate billing.

In addition to regulators mandate to encrypt mobile virtual operator's traffic using IPsec from the shared Radio Access Networks (RAN) to their core networks, Stoke cautined that wholesalers need mechanisms to implement policy enforcement at the common aggregation point in the event that a partner is in violation of the service level agreement.

According to Stoke, the crucial area and first point of defense is at the edge of the RAN, before the traffic passes through the operator's data center. The Stoke security gateway is situated in this natural aggregation spot in the network and also features the ability to provide latency-free traffic security as well as DIAMETER-based inter-carrier accounting and policy enforcement.

"One of the key challenges in completing a network share is the ability to identify and assign relative valuations for each operator's traffic as it is shared or transferred over the network. It is also vital to enable accurate, secure inter-carrier accounting. This requires the creation of charging and policy management mechanisms between sharing partners at a common, clear-text aggregation point, as well as additional security at the border of the radio access network and the LTE operator core. Points of vulnerability are magnified in shared LTE environments, because of factors like operator partners' need to exchange data for subscriber management and billing, differences between carriers' controls and security approaches, and the numbers of remote cell sites that are now part of the mix. Furthermore, since in LTE each cell site may be associated with as many as 16 interfaces into the network core, the mobile access border represents a significant security risk to operators and users."

-           Dilip Pillaipakam, Vice President of Product Management and Marketing at Stoke  

Ray is a news editor at The Fast Mode, bringing with him more than 10 years of experience in the wireless industry.

For tips and feedback, email Ray at ray.sharma(at)thefastmode.com, or reach him on LinkedIn @raysharma10, Facebook @1RaySharma

PREVIOUS POST

Kodiak Networks Picks Razorsight Advanced Push-to-Talk (PTT) Data Analytics

NEXT POST

Oracle Unveils Acme Packet 1100 Session Border Controller for Mid-Size Business' Real-Time Communications

THE EDITOR'S DESK

UPCOMING EVENTS

Telco AI Summit Europe 2019

TADSummit 2019

MWC Los Angeles 2019

The Digitrans Forum 2019

Digital Transformation Asia 2019

Open Edge Symposium 2019

 

ON TWITTER

ON FACEBOOK