The mobility of users results in
roaming between networks and potentially across different
access technologies such as 4G and WiFi. This
dynamic change adds complexity to the diagnose and
detection of anomaly activities and as well as the security
credential exchange