Abstract:
A system and a method of counter management and security key update for device-to-device (D2D) communication are provided. The method includes creating by a user equipment, a new packet data convergence protocol (PDCP) entity for a service group wherein a service group is identified by a destination identifier (ID), determining if any PDCP entity of the service group exists or not, generating a new proximity service (ProSe) traffic key (PTK) from a ProSe group key (PGK) corresponding to the service group associated with the new PDCP entity, initializing a new packet counter associated with the service group to zero if the new PDCP entity is a first PDCP entity associated with the service group, generating a ProSe encryption key (PEK) from the PTK and encrypting data packets mapped to the new PDCP entity using the PEK and a packet counter associated with the service group.
Abstract:
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology. such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. Embodiments herein achieve a method for authenticating access in a mobile wireless network system. The method includes receiving by an Extensible Authentication Protocol (EAP) authenticator an EAP packet encapsulated from an access terminal over a high rate packet data radio link and a signaling interface through a radio access network. The EAP packet is encapsulated over at least one of a Non-Access Stratum (NAS) interface, a Radio Resource Control (RRC) interface and a N1 interface. The EAP authenticator is located at a secured node in a core network of the radio access network. Further, the method includes authenticating by the EAP authenticator at least one of a network access subscription and a service of the access terminal.
Abstract:
Embodiments herein provide a method and system for managing session across multiple electronic devices in a network system. The method includes receiving by a target electronic device a first message from a source electronic device which includes a request to transfer context associated with at least one ongoing session on the source electronic device. Further, the method includes sending a response message to the source electronic device which includes a confirmation for the context transfer to. Further, the method includes receiving a Carry Your Own Context (CYOC) container associated with the at least one ongoing session from the source electronic device, wherein the CYOC container consists of cellular parameter information required for seamless session transfer from the source electronic device to the target electronic device. Furthermore, the method includes completing the at least one session transfer using the cellular parameter information received in the CYOC container.
Abstract:
The embodiments herein provide a method and system for creating a secure connection for a User Equipment (UE) in a wireless network including a UE, carrier aggregated with at least one first serving frequency served by a first eNB and at least one second serving frequency served by a second eNB. A unique non-repetitive security base key associated with the second eNB is generated using a freshness parameter and security key associated with the first eNB. The use of a different freshness parameter for each security base key derivation avoids key stream repetition. Further, a user plane encryption key is derived based on the generated unique non-repetitive security base key associated with the second eNB for encrypting data transfer over at least one data radio bearer.
Abstract:
Embodiments herein provide a method for performing multiple authentications within a service registration procedure. The method includes sending, by a User Equipment (UE) a REGISTER request message to an IP Multimedia Subsystem (IMS) server. Further, the method includes receiving, an IMS authentication challenge from the IMS server, where the IMS authentication challenge includes an IMS authentication parameter and a MCPTT authentication challenge. Further, the method includes verifying, at the UE, the IMS authentication challenge. Further, the method includes generating, at the UE, a REGISTER response message. Further, the method includes sending, a REGISTER response message to the IMS server, where the REGISTER response message includes an IMS authentication response to authenticate UE at the IMS server and a MCPTT authentication response to authenticate the UE at the MCPTT server.
Abstract:
The present disclosure relates to a pre-5th-Generation (5G) or 5G communication system to be provided for supporting higher data rates beyond 4th-Generation (4G) communication system such as a Long Term Evolution (LTE). Embodiments herein provide a method for establishing a wireless-fidelity (Wi-Fi) direct connection between a first user equipment (UE) and a second UE. The method includes sending, by a trusted network entity, a request message to each of the first UE and the second UE. Further, the method includes receiving, by the trusted network entity, a response message from each of the first UE and the second UE. Further, the method includes generating, by the trusted network entity, at least one Wi-Fi key based on the response message. Further, the method includes sending, by the trusted network entity, a setup request message to each of the first UE and the second UE, wherein the setup request message comprises the at least one of a Wi-Fi key, a group owner identifier, and network data to establish the Wi-Fi direct connection between the first UE and the second UE.
Abstract:
A system and a method of counter management and security key update for device-to-device (D2D) communication are provided. The method includes creating by a user equipment, a new packet data convergence protocol (PDCP) entity for a service group wherein a service group is identified by a destination identifier (ID), determining if any PDCP entity of the service group exists or not, generating a new proximity service (ProSe) traffic key (PTK) from a ProSe group key (PGK) corresponding to the service group associated with the new PDCP entity, initializing a new packet counter associated with the service group to zero if the new PDCP entity is a first PDCP entity associated with the service group, generating a ProSe encryption key (PEK) from the PTK and encrypting data packets mapped to the new PDCP entity using the PEK and a packet counter associated with the service group.
Abstract:
A method and an apparatus for verifying identity of a direct communication message using asymmetric keys in a wireless communication network comprising a plurality of electronic devices is provided. The method includes distributing a public key associated with a second electronic device among a plurality of electronic devices by a Device-to-Device (D2D) server. The method includes receiving the direct communication message from the second electronic device at a first electronic device. The direct communication message comprises a digital signature generated using a private key associated with the second electronic device. Further, the method includes verifying the identity of the direct communication message using the public key associated with the second electronic device.
Abstract:
The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. Embodiments herein provide a system and method for key refresh in Authentication and Key Management for Applications (AKMA). The proposed method is to support KAKMA refresh by requesting the refreshing parameters from the network once the KAF is about to expire. Further, the proposed method is to support KAF refresh by requesting the refreshing parameters from the network once the KAF is about to expire. Further the proposed method uses certain mechanisms to provide the refresh parameter to the AUSF, AAnF and the UE as a part of AKMA Refresh procedure or as a part of UPU procedure. Further, the proposed method supports AKMA key refresh with limited impacts on AKMA services in 5G system. Furthermore, the proposed method is used to support a mechanism to address the Key synchronisation issue at a User Equipment (UE) side, AF and at the network side.
Abstract:
The present disclosure relates to a pre-5th generation (5G) or 5G communication system to be provided for supporting higher data rates beyond 4th generation (4G) communication system such as long term evolution (LTE). Embodiments herein provide a method of authentication and authorization between a MSGin5G server and a MSGin5G client, the method comprising: receiving, by a MSGin5G interworking function, a pre-shared key request from one of a SEAL server and a MSGin5G Server; deriving, by the MSGin5G interworking function a pre-shared key KMSG-PSK in response to the pre-shared key request; sending, by the MSGin5G interworking function, the pre-shared key KMSG-PSK to one of the SEAL server and the MSGin5G Server; deriving, by a MSGin5G client, the pre-shared key upon receiving either before or after service provisioning procedure; and establishing a TLS session using the pre-shared key KMSG-PSK derived by the MSGin5 interworking function and the MSGin5G client.