AT&T Developer
  • Products
  • Resources
  • Blog
  • Sign In

Technical Library

    Device Technologies
    • Biometrics
    • Device Detection
    • HTML5
    • Mobile Web Fundamentals
    • Mobile Web Standards
    • Multi Core Coding in Dalvik
    • Multi Thread Coding in Android
    • Near Field Communication
    • NFC Forum
    • NFC Use Cases
    • NFC Case Studies
    • NFC Tags
    • GlobalPlatform and NFC
    • User Identification
    • Native Code
    Security and Privacy
    • Application Privacy Guidelines
    • Downloading DRM Content in Android
    • IPv6
    • Likelihood of a Successful Attack
    • Messaging Privacy
    • Mobile Web Security
    • Network Security
    • Security Policy
    • Security at AT&T
    • Types of Security Threats
    • Wireless Application Security
    • Security Policy Enforcement
    UI Elements
    • Slider Controls for Android
    • Check Box for Android
    • Dropdown for Android
    • Image Button for Android
    • Toggle Button for Android
    • Radio Button for Android
    • Segmented Text Toggle Button for Android
    • Static Text Toggle Button for Android
    • Switch for Android
    • Text Fields for Android
    • Getting Started with AT&T UI
    • HTML5 UI Elements
    • HTML5 Checkboxes
    • HTML5 Dropdown
    • HTML5 Image Button
    • HTML5 Image Toggle Button
    • HTML5 Radio Button
    • HTML5 Segmented Toggle Button
    • HTML5 Slider
    • HTML5 Static Text Toggle Button
    • HTML5 Switch Control
    • HTML5 Text Fields
    Network Technologies
    • IP Addresses
    • Long Term Evolution (LTE)
    • Network Timers
    • Wi-Fi
  • Other AT&T Websites
  • Best Practices
    • Hackathon Best Practices
    • Mobile Best Practices
    • Seven Common Errors Around Creating Mobile User Experiences
toggle menu

Network Security

 

Along with the comprehensive security built into the GSM/GPRS, EDGE, and UMTS/HSDPA network technologies, AT&T has enhanced its network with additional security features.  Resulting key benefits include:

  • Protection of user identities
  • Protection against unsolicited data at the mobile station
  • Authentication of the mobile station against credentials stored in the Subscriber Identity Module (SIM) card
  • Use of passwords for user access (optional)
  • Encryption of user data over the radio link
  • Use of dynamically generated encryption keys (per session) between the mobile system and the network (periodic key updates also possible)
  • Alternative secure options (frame relay and Virtual Private Network) to connect customer networks to the AT&T networks
  • Radius authentication for subscriber validation (UMTS only)

End-to-End Security
Looking at security over the entire network, from the mobile station to the fixed-end system, the connection has three segments, each with its own security mechanisms:

  • Radio link.  Employs authentication and encryption mechanisms built into the network technologies.
  • GPRS/EDGE/UMTS infrastructure network.  Employs a private network and firewalls to block unsolicited traffic.
  • GPRS/EDGE network to customer network connection.  Relies on two different secure fixed-end connection options, frame-relay permanent-virtual circuits, and Virtual Private Network (VPN) connections via the Internet.  AT&T supports both these options.

The security mechanisms present in each segment make AT&T's wireless network security sufficient for most applications.  You can also deploy your own end-to-end security mechanisms (for example, client-based VPN technology) at the application level.  AT&T has successfully tested its network for compatibility against most of the major VPNs used in the wireless industry.

Security in Enterprise Applications
If you are using a VPN for your enterprise application, you might want to consider a wireless-specific VPN solution as these offer performance advantages through data compression and mobility management that allows you to maintain sessions even as you change the underlying network, such as moving from a WLAN coverage area to a UMTS coverage area.

Back To Top
  • APIS & TOOLS
    • AT&T Video Optimizer
  • APIS & TOOLS
    • Futurist Reports
    • Technical Library
  • SUPPORT
    • Contact Us
    • FAQs
    • Twitter
  • AT&T Developer Program on Github
  • AT&T Developer Program on Facebook
  • AT&T Developer Program on Twitter
AT&T Logo

Terms of Use   Privacy Policy   Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
©2025 AT&T Intellectual Property. All rights reserved

AT&T, the AT&T logo and all other AT&T marks contained herein are trademark of AT&T Intellectual Property and/or AT&T affiliated companies.

14100000
Session Expiring

Your session is about to expire in !

Stay Signed In
Session Expired

Sorry! Your session has expired.

Skip to content