Method and user equipment for determining whether base station is genuine or rouge in wireless network

    公开(公告)号:US12170893B2

    公开(公告)日:2024-12-17

    申请号:US17768658

    申请日:2020-10-14

    Abstract: The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. Embodiments herein provide a method for determining whether a base station is genuine or rouge in a wireless network. If a received authentication key matches with the authentication key generated in the UE, the method includes identifying a base station as genuine base station and carrying out a normal procedure. If the received authentication key does not match with the generated authentication key, the method includes identifying the base station as a rouge base station. The authentication key can be a digital signature (DS), a Message Authentication Code-Integrity (MAC-I), and a hash of MIB/SIBs including PCI.

    Method and system for optimizing AKMA key refresh mechanism in wireless network

    公开(公告)号:US12081974B2

    公开(公告)日:2024-09-03

    申请号:US17561078

    申请日:2021-12-23

    CPC classification number: H04W12/06 H04W12/0433 H04W12/37

    Abstract: The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). A method performed by a user equipment (UE) in a wireless network, the method comprising: establishing a communication with an application function (AF) server using a first authentication and key management for applications (AKMA) application key (KAF); receiving a message over the established communication from the AF server, the message indicating that a lifetime of the first KAF has expired; and configuring a back-off flag in the UE to optimize an AKMA key refresh mechanism in the wireless network in response to receiving the message, wherein the back-off flag prevents a request for a first AKMA anchor key (KAKMA) until a fresh primary authentication is performed.

    Method and system for detecting cyber-attacks using network analytics

    公开(公告)号:US12200492B2

    公开(公告)日:2025-01-14

    申请号:US17672136

    申请日:2022-02-15

    Abstract: The disclosure relates to 5G or 6G communication systems for supporting higher data transmission rates.
    A method of detecting cyber-attacks using network analytics in a user equipment (UE) is provided. The method includes receiving, by a network data analytics function (NWDAF), a request for sharing analytics information associated with the UE from a consumer network function (NF), requesting the analytics information associated with the UE and causing the cyber-attack to at least one 5th generation core (5GC) network entity, receiving the analytics information associated with the UE and causing the cyber-attack from the at least one 5GC network entity, comparing an expected behavior of the UE with an actual behavior based on the analytics information provided by the at least one 5GC network entity, deriving analytics associated with the cyber-attack based on the analytics information and the comparison, and sending the analytics associated with the UE to the consumer NF.

    Methods and systems for deriving cu-up security keys for disaggregated gNB architecture

    公开(公告)号:US11722890B2

    公开(公告)日:2023-08-08

    申请号:US17443422

    申请日:2021-07-26

    CPC classification number: H04W12/041 H04W12/033 H04W12/043 H04W12/106

    Abstract: The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. Methods and systems for generating/deriving CU-UP security keys for disaggregated gNB architecture are described herein. A UE/gNB can inform the gNB/UE about the capability of the UE/gNB to derive CU-UP security keys. CU-UP security keys comprise an integrity protection key and a ciphering key. The gNB derives an integrity protection key and a ciphering key upon determining that the UE supports derivation of the CU-UP security keys or the UE has capability to derive CU-UP security keys. The integrity protection key protects the integrity of data, in a DRB, traversing through a CU-UP. The ciphering key encrypts the data, in the DRB, traversing through the CU-UP. The gNB sends RRC connection reconfiguration messages, which include multiple parameters. The UE derives an integrity protection key and a ciphering key, for each DRB, based on the plurality of parameters, for protecting the integrity of the data and encrypting the data.

Patent Agency Ranking