Abstract
Jonathan Rodriguez. all data flowing between the targeted end user and the network. This attack exploits the unprotected user traffic in some part of the HeNB . For that reason, unprotected user data should never leave a secure domain inside ...