Abstract:
A system and a method of counter management and security key update for device-to-device (D2D) communication are provided. The method includes creating by a user equipment, a new packet data convergence protocol (PDCP) entity for a service group wherein a service group is identified by a destination identifier (ID), determining if any PDCP entity of the service group exists or not, generating a new proximity service (ProSe)traffic key (PTK) from a ProSe group key (PGK) corresponding to the service group associated with the new PDCP entity, initializing a new packet counter associated with the service group to zero if the new PDCP entity is a first PDCP entity associated with the service group, generating a ProSe encryption key (PEK) from the PTK and encrypting data packets mapped to the new PDCP entity using the PEK and a packet counter associated with the service group.
Abstract:
Embodiments herein relates to preventing UE from bidding down to restricted RAT type. The method includes determining, by network apparatus, restricted RAT types based on a network policy associated with network operator and subscription data. The RAT types can be a 5G, 4G, 3G, and 2G. Further, the method includes transmitting RAT restriction information in signalling message or configuration message to indicate the restricted RAT types to the UE to prevent the UE camping on to the restricted RAT types.
Abstract:
The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. Embodiments herein disclose a method and system for authentication method selection in an edge network system. The method includes determining whether the UE is configured with authentication methods supported by at least one of an ECS, an EES, a home network and a serving network in the edge network system. The method further includes selecting the authentication methods configured at the UE based on a capability of the UE to establish a connection with the EES based on the at least one selected authentication method when the UE is configured with the authentication methods supported by at least one of the ECS, the EES, the home network and the serving network.
Abstract:
The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. Disclosed herein is method and system for authorizing a MCX server. An authorization server is configured to receive a validation request from a MCData message store in response to a user account access request received by MCData message store from MCX server. Further, authorization server is configured to validate identification information of MCX server. Further, authorization server is configured to transmit a validation response to MCData message store indicating authorization of MCX server to access user account in MCData message store, upon successful validation of identification information of tMCX server. An authorization server is introduced to provide additional layer of security to user account with MC Data.
Abstract:
The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. Method and system for supporting protection of MBS traffic in wireless network. Embodiments herein disclose a method and a system for supporting protection of Multi-cast Broadcast Service (MBS) traffic in a wireless network. The method includes receiving security information in a MBS announcement by user equipment (UE) (100). The method includes determining if MBS traffic protection is applied or not over the service layer; determining whether security capability of the MBS supports handling of the MBS traffic protected at the service layer, when the MBS traffic protection is applied over the service layer; joining a MBS session by sending a Non-access stratum (NAS) request message to a session management function (SMF) device (200), and requesting for the 5GC individual traffic delivery method by including an indication in the NAS request message, if the security capability of the MBS does not support handling of the MBS traffic protected at the service layer; and receiving the MBS traffic via 5GC individual traffic delivery method.
Abstract:
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. Embodiments herein provide a method for determining whether a base station is genuine or rouge in a wireless network. If a received authentication key matches with the authentication key generated in the UE, the method includes identifying a base station as genuine base station and carrying out a normal procedure. If the received authentication key does not match with the generated authentication key, the method includes identifying the base station as a rouge base station. The authentication key can be a digital signature (DS), a Message Authentication Code-Integrity (MAC-I), and a hash of MIB/SIBs including PCI.
Abstract:
The present disclosure relates to a pre-5th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4th-Generation (4G) communication system such as Long Term Evolution. Methods and systems for mitigating Denial of Service (DOS) attacks in wireless networks, by performing admission control by verifying a User Equipment's (UE's) registration request via a Closed Access Group (CAG) cell without performing a primary authentication are provided. Embodiments herein disclose methods and system for verifying permissions of the UE to access a CAG cell based on the UE's Subscription identifier, before performing the primary authentication. The method for mitigating DOS attacks in wireless networks includes requesting a public land mobile network for accessing a non-public network (NPN) through a CAG cell, verifying the permissions of a UE to access the requested NPN through the CAG cell, and performing a primary authentication.
Abstract:
Accordingly, the embodiments herein provide a method for authentication of an IAB node by an IAB-donor node in a wireless network. The method includes obtaining an IAB authorization information of the IAB node from one of an Access and Mobility Management Function (AMF) and a Mobility Management Entity (MME) of the wireless network, determining whether the IAB authorization information of the IAB node indicates the IAB node is authorized, and allocating a unique identity/parameter to the IAB node during an IAB- Mobile Termination (MT) setup and/or Backhaul Radio Link Control (RLC) channel establishment and/or Routing update phase. Further, the method includes storing the unique identity/parameter in a user equipment (UE) - context, which is used to identify the UE-context during an IAB- Distributed Unit (DU) part setup for authorization check and/or authentication.
Abstract:
According to an embodiment of a present disclosure, a method performed by AKMA anchor function (AAnF) in a wireless communication system is provided. The method may include: receiving, from an application function (AF), a message for requesting authentication and key management for applications (AKMA) application key for a user equipment (UE); checking whether the AAnF provides AKMA service to the AF based on a local policy; and based on a result of the checking, determining whether to derive the requested AKMA application key for the UE.
Abstract:
The present disclosure relates to a pre-5th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4th-Generation (4G) communication system such as Long Term Evolution (LTE). According to embodiments of the present disclosure, a method for managing network slice specific authentication and authorization (NSSAA) procedure in wireless communication network is provided.