The paper examines alternative security procedures, such as Transport Layer Security (TLS) and Datagram TLS (DTLS) protocols for securing IP based backhaul from femto access point to mobile operator.
The paper examines alternative security procedures, such as Transport Layer Security (TLS) and Datagram TLS (DTLS) protocols for securing IP based backhaul from femto access point to mobile operator. (en)