A look at how the SQN resync procedure is performed in the IMS Authentication flows

A look at how the SQN resync procedure is performed in the IMS Authentication flows
Acronyms and cryptography – a look at Subscriber Identifiers in 5G
This is part of a series of posts focusing on common Diameter request pairs, looking at what’s inside and what they do. The Authentication Information Request (AIR) and Authentication Information Answer (AIA) are one of the first steps in authenticating a subscriber, and a very common Diameter transaction. The Process The Authentication Information Request (AIR) […]
Using osmo-sim-auth to query USIM/SIM cards authentication mechanism.
Exploring the how and why of Authentication in LTE & NR networks.
Adventures in getting USIMs to use on private LTE networks.
How LTE Subscriber authenticate the network
LTE/4G’s use of RAND and K to verify subscribers identity.
Contents of a USIM, fields & their meanings and basics of EUTRAN authentication.