Abstract:
Methods and apparatuses are provided for operations in a wireless communication system. A universal subscriber identity module (USIM) application is identified that is configured with security credentials comprising an isolated evolved universal mobile telecommunications system terrestrial radio access network (E-UTRAN) operation for public safety (IOPS) identity and an access class for an IOPS operation. An authentication procedure is performed with an evolved node B (eNB) based on the security credentials. The security credentials are a distinct set of security credentials for the IOPS operation separate from those used for a normal operation.
Abstract:
A communication method and a system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for internet of things (IoT) are provided. The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A system and a method for validating authenticity of a base station and/or information received from the base station are provided. The method for determining authenticity of system information received from a base station and a cell operated by the base station includes receiving, from a base station, system information, receiving, from a base station, system information, receiving, from the base station, first authenticity information associated with the system information, determining whether the system information is authentic based on the first authenticity information, and determining that a cell operated by the base station is authentic if the system information is authentic.
Abstract:
The embodiments herein provide a method and system for creating a secure connection for a User Equipment (UE) in a wireless network including a UE, carrier aggregated with at least one first serving frequency served by a first eNB and at least one second serving frequency served by a second eNB. A unique non-repetitive security base key associated with the second eNB is generated using a freshness parameter and security key associated with the first eNB. The use of a different freshness parameter for each security base key derivation avoids key stream repetition. Further, a user plane encryption key is derived based on the generated unique non-repetitive security base key associated with the second eNB for encrypting data transfer over at least one data radio bearer.
Abstract:
The embodiments herein provide a method and system for creating a secure connection for a User Equipment (UE) in a wireless network including a UE, carrier aggregated with at least one first serving frequency served by a first eNB and at least one second serving frequency served by a second eNB. A unique non-repetitive security base key associated with the second eNB is generated using a freshness parameter and security key associated with the first eNB. The use of a different freshness parameter for each security base key derivation avoids key stream repetition. Further, a user plane encryption key is derived based on the generated unique non-repetitive security base key associated with the second eNB for encrypting data transfer over at least one data radio bearer.
Abstract:
A method and a system for providing simultaneous transmission and reception across multiple evolved NodeBs (eNBs) from a User Equipment (UE) in a Long Term Evolution (LTE) network are provided. The method includes establishing a first connection between the UE and a core network through a Serving-eNB (S-eNB), considering at least one Target-eNB (T-eNB) for at least one connection between the UE and a Packet Data Network (PDN), determining availability of the T-eNB, wherein the determining of the availability of the at least one T-eNB is triggered based on available resource in the S-eNB and the T-eNB, and establishing at least one connection between the UE and the PDN through one or more T-eNBs, at least one Serving-GateWay (S-GW), and at least one PDN gateway.
Abstract:
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). A method performed by a user equipment (UE) in a wireless network, the method comprising: establishing a communication with an application function (AF) server using a first authentication and key management for applications (AKMA) application key (KAF); receiving a message over the established communication from the AF server, the message indicating that a lifetime of the first KAF has expired; and configuring a back-off flag in the UE to optimize an AKMA key refresh mechanism in the wireless network in response to receiving the message, wherein the back-off flag prevents a request for a first AKMA anchor key (KAKMA) until a fresh primary authentication is performed.
Abstract:
The present disclosure relates to a pre-5th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4th-Generation (4G) communication system such as Long Term Evolution (LTE). A method disclosed herein includes authenticating a User Equipment (UE) using a 3rd Generation Partnership Project (3GPP) subscription credential for accessing non-3GPP services from a non-3GPP network. The method includes authenticating the UE before allowing access to the non-3GPP services from the non-3GPP network. The method further includes using 3GPP security credentials for authenticating the UE to access the non-3GPP services from the non-3GPP network.
Abstract:
The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. Embodiments herein provide a system and method for key refresh in Authentication and Key Management for Applications (AKMA). The proposed method is to support KAKMA refresh by requesting the refreshing parameters from the network once the KAF is about to expire. Further, the proposed method is to support KAF refresh by requesting the refreshing parameters from the network once the KAF is about to expire. Further, the proposed method is used to support a mechanism to address the Key synchronisation issue at a User Equipment (UE) side, an Application Function (AF) side and at an AAnF using a key index included as a part of AKMA key identifier (A-KID). Further the proposed method uses certain mechanisms to provide the refresh parameter to the AUSF, the AAnF and the UE as a part of AKMA Refresh procedure or as a part of UPU procedure. Further, the proposed method supports AKMA key refresh with limited impacts on AKMA services in 5G system.
Abstract:
The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. Embodiments herein disclose a method for providing restricted service access in a wireless network by a first network entity (i.e., target AMF entity (400)). The method includes requesting a NRF entity (600) to grant an access-token to access a second network entity (i.e., initial AMF entity (300)). Further, the method includes receiving a message comprising a restricted service access to the second network entity based on the access-token. Further, the method includes sending a restricted UE context transfer request to the second network entity based on the message comprising the restricted service access. Further, the method includes receiving a UE context transfer response from the second network entity based on the restricted UE context transfer request.
Abstract:
Embodiments herein provide a method for handling synchronization of Home Network (HN) security key(s) in a wireless network. The proposed method includes receiving a Non-access stratum (NAS) authentication request message from a network entity (200A), where the UE (100A) holds a first Home network (HN) security key. Further, the method includes determining an authentication response message for the received NAS authentication request message and generating a second HN security key from a plurality of input parameters received in the NAS authentication request message and sending authentication response message to the network entity (200A). Further, the method includes storing the second HN security key in response to receiving a NAS security mode command message from the network entity (200A) or ignore the second HN security key in response to receiving a NAS reject message from the network entity (200A).