This document provides an overview of GSM security solutions and UMTS authentication. It discusses GSM subscriber authentication using the A3 and A8 algorithms as well as encryption of voice traffic and signaling data using the A5 algorithm. It describes the use of temporary mobile subscriber identities and issues around roaming fraud. The document also outlines UMTS authentication and key agreement, noting that it adds mutual authentication between the user equipment and network compared to GSM. Finally, it discusses some security aspects and attacks related to mobility in Mobile IPv6 networks.