Abstract:
The present disclosure relates to a communication method and system for converging a 5th-generation (5G) communication system for supporting higher data rates beyond a 4th-generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. Embodiments herein disclose a network management apparatus, method, and computer-readable storage medium for or management of shared NSI in a communication system.
Abstract:
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. Embodiments disclose a method and system for handling a network slice specific authentication and authorization (NSSAA) process in a wireless network system.
Abstract:
A method for handling a security procedure in a MC communication system (1000) is provided. The method includes selecting, by a MC service server (100), the security procedure, including a signaling procedure parameter during a key management procedure, and indicating, by the MCservice server (100), the selected security procedure to protect at least one MC service signaling field by including the signaling procedure parameter to at least a MC service client (200) during the key management procedure.
Abstract:
Accordingly the embodiments herein provide a method for reconnecting a Radio Resource Control (RRC) connection with a Radio Access Network (RAN) node by a User Equipment (UE) in a wireless communication system. The method includes transmitting a message 3 (MSG3) of a random access procedure on Signaling Radio Bearer 0 (SRB0) for reconnecting the RRC connection. The MSG3 is a request message to the RAN node with set of connection parameters. Further, the method includes receiving a message 4 (MSG4) of the random access procedure from the RAN node. The MSG4 is received on a SRB0 or a Signaling Radio Bearer 1 (SRB1). Furthermore, the method includes transmitting a message 5 (MSG5) on the SRB1 to RAN node for reconnecting RRC connection. The proposed method can be used to mitigate a replay attack on the UE in a inactive state using a nonce and a wait time interval.
Abstract:
Method and system for handling of special SCell selection in dual connectivity. The present invention relates to the field of wireless communication networks and more particularly to a User Equipment (UE) operating in dual connectivity mode in wireless communication networks. The principal object of the embodiments herein is to provide a method and system for handling of special SCell (PSCell) change by extending Event A3 or Event A5 to PSCell for relative comparison. Another object of the invention is to provide a method and system for handling of special SCell (PSCell) change with a new Event Ax.
Abstract:
The present invention relates to a method and a system for securing discovery information being transmitted through a direct radio signal in a wireless communication system which supports a device-to-device service, and a device-to-device communication method of a transmission terminal, according to one embodiment of the present invention, can comprise: synchronizing with a discovery resource cycle number; determining discovery channel logical timing information of a discovery physical channel through which discovery information is to be transmitted; generating security information by using a security key, the determined discovery channel logical timing information and the discovery information to be transmitted; and transmitting the discovery information including the security information through the discovery physical channel. According to one embodiment of the present invention, it is possible to prevent discovery information of a terminal to be wrongly transmitted due to a case where another rogue terminal receives and changes the discovery information of the terminal, or the like.
Abstract:
A method by a wireless local area network (WLAN) termination (WT) node is described. The method includes receiving, from a base station, a first message including bearer related information; identifying access category information based on quality of service (QoS) class identifier (QCI) information included in the bearer related information; transmitting, to the base station, a second message in response to the first message; and transmitting, to a terminal, data based on the access category information.
Abstract:
The present invention relates to a method and a system for securing discovery information being transmitted through a direct radio signal in a wireless communication system which supports a device-to-device service, and a device-to-device communication method of a transmission terminal, according to one embodiment of the present invention, can comprise the steps of: synchronizing with a discovery resource cycle number; determining discovery channel logical timing information of a discovery physical channel through which discovery information is to be transmitted; generating security information by using a security key, the determined discovery channel logical timing information and the discovery information to be transmitted; and transmitting the discovery information including the security information through the discovery physical channel. According to one embodiment of the present invention, it is possible to prevent discovery information of a terminal to be wrongly transmitted due to a case where another rogue terminal receives and changes the discovery information of the terminal, or the like.
Abstract:
A method of operating a User Equipment (UE) enabled isolated Evolved Universal Mobile Telecommunications System Terrestrial Radio Access Network (E-UTRAN) operation for public safety (IOPS) is provided. The method includes receiving, from an IOPS-capable eNodeB (eNB), a system information block (SIB) message including an IOPS public land mobile network (PLMN) identity; activating a dedicated IOPS universal subscriber identity module (USIM) application based on the IOPS PLMN identity; and authenticating the IOPS-capable eNB based on the dedicated IOPS USIM application.
Abstract:
The embodiments herein provide a method and system for creating a secure connection for a User Equipment (UE) in a wireless network including a UE, carrier aggregated with at least one first serving frequency served by a first eNB and at least one second serving frequency served by a second eNB. A unique non-repetitive security base key associated with the second eNB is generated using a freshness parameter and security key associated with the first eNB. The use of a different freshness parameter for each security base key derivation avoids key stream repetition. Further, a user plane encryption key is derived based on the generated unique non-repetitive security base key associated with the second eNB for encrypting data transfer over at least one data radio bearer.