Abstract:
Certain aspects of the present disclosure relate to methods and apparatuses for handling malicious attacks. In one aspect, the methods and apparatuses are configured to identify packets received from a malicious source based at least in part on packets received by a wireless device that change a state of the wireless device from a dormant state to a connected state, selectively disconnect the wireless device from a packet data network (PDN) by releasing a first Internet Protocol (IP) address used to connect the wireless device to the PDN when a number of packets identified as received from the malicious source reaches a threshold number within a monitoring period, and reconnect the wireless device to the PDN using a second IP address that is different from the first IP address. In another aspect, a connection to an IP Multimedia Subsystem (IMS) PDN is maintained after the PDN is disconnected.
Abstract:
Embodiments described herein relate to a method of managing communications for a wireless communication device having a first Subscriber Identity Module (SIM) associated with a first subscription and a second SIM associated with a second subscription, the method including, but not limited to, determining that the first subscription is a Default Data Subscription (DDS), deactivating at least one first Packet Data Network (PDN) associated with the second subscription, and communicating via at least one second PDN associated with the second subscription, wherein the at least one first PDN is different from the at least one second PDN.
Abstract:
Embodiments described herein relate to a method of managing communications for a wireless communication device having a first Subscriber Identity Module (SIM) associated with a first subscription and a second SIM associated with a second subscription, the method including, but not limited to, determining that the first subscription is a Default Data Subscription (DDS), deactivating at least one first Packet Data Network (PDN) associated with the second subscription, and communicating via at least one second PDN associated with the second subscription, wherein the at least one first PDN is different from the at least one second PDN.
Abstract:
A method for wireless communication by a wireless relay device comprises receiving, over a first wireless connection of a first connection type between a first wireless device and the relay device, a request to establish a connection between the first wireless device and a network via the first wireless connection and a second wireless connection of a second connection type between the relay device and the network. The method further comprises determining a priority associated with the first wireless device based on at least one parameter associated with the first wireless device. The method further comprises establishing, at the relay device, the connection between the first wireless device and the network when the priority associated with the first wireless device is higher than a priority associated with at least one of a plurality of other wireless devices having a connection with the network via the second wireless connection.
Abstract:
Certain aspects of the present disclosure relate to methods and apparatuses for handling malicious attacks. In one aspect, the methods and apparatuses are configured to identify packets received from a malicious source based at least in part on packets received by a wireless device that change a state of the wireless device from a dormant state to a connected state, selectively disconnect the wireless device from a packet data network (PDN) by releasing a first Internet Protocol (IP) address used to connect the wireless device to the PDN when a number of packets identified as received from the malicious source reaches a threshold number within a monitoring period, and reconnect the wireless device to the PDN using a second IP address that is different from the first IP address. In another aspect, a connection to an IP Multimedia Subsystem (IMS) PDN is maintained after the PDN is disconnected.