Hop by hop security in IAB networks

    公开(公告)号:US11751047B2

    公开(公告)日:2023-09-05

    申请号:US17431802

    申请日:2020-01-03

    IPC分类号: H04W12/03 H04W12/106

    CPC分类号: H04W12/03 H04W12/106

    摘要: A method and apparatus for a first IAB node for securely communicating with at least one second IAB node is provided. A secure connection with a node of a network is established. A message is received, from the node, indicating a secure messaging protocol to use to communicate with the at least one second IAB node, the message including one of at least one nonce or a key. A control message to be sent to the at least one second IAB node is transformed into a secure control message using the secure messaging protocol. The secure control message is transmitted to the at least one second IAB node.

    Measurement Reporting Configuration

    公开(公告)号:US20230072998A1

    公开(公告)日:2023-03-09

    申请号:US17795299

    申请日:2021-01-28

    摘要: Network equipment (12) comprising a processing circuitry (81) and a memory (83), where the memory contains instructions executable by the processing circuitry whereby the network equipment is configured to: identify a set of measurements to be used for false base station detection in an area (22); configure different sets (18-1, 18-2, 18-N) of one or more wireless devices (14) to report different respective measurements in the set by transmitting measurement reporting configurations (20-1, 20-2, 20-N) to the wireless devices (14); receive measurement reports from the different sets (18-1, 18-2, 18-N) of one or more wireless devices (14) as configured; and perform false base station detection for the area (22) using the received measurement reports. Methods, a wireless device (14), and communication systems are also disclosed.

    Radio access capabilities of a wireless device

    公开(公告)号:US11589235B2

    公开(公告)日:2023-02-21

    申请号:US17257135

    申请日:2020-01-10

    摘要: A network node (30A, 30B) is configured for use in a wireless communication network (10). The network node (30A, 30B) is configured to acquire radio access capability information (28) of a wireless device (14). The radio access capability information (28) of the wireless device (14) indicates radio access capabilities of the wireless device (14). The network node (30A, 30B) is configured to determine if the wireless communication network (10) received the radio access capability information (28) of the wireless device (14) before access stratum security (24) was activated for the wireless device (14). If the wireless communication network (10) received the radio access capability information (28) of the wireless device (14) before access stratum security (24) was activated for the wireless device (14) according to that determination, the network node (30A, 30B) is configured to re-acquire the radio access capability information (28) of the wireless device (14) after access stratum security (24) is activated for the wireless device (14).

    Method for improving data transmission security

    公开(公告)号:US11563749B2

    公开(公告)日:2023-01-24

    申请号:US16963239

    申请日:2019-02-14

    IPC分类号: H04L9/40 H04L9/32

    摘要: A method for improving data transmission security at a user equipment comprises receiving, from a source network node, a connection release message including instructions for computing a hash value for data to be included in a connection request message; computing the hash value based on the instructions included in the connection release message; calculating a token based on the hash value, and sending, to a target network node, the connection request message including the token. The method may further forward the data from the target network node directly to a gateway after the token has been verified. The method may reduce a signaling overhead by having a fixed-size hash value for data. Furthermore, the method may improve a transmission security by including the token in an RRC message, in which the token is calculated based on the hash value representing the data.

    Methods, UE and Network Node for Handling System Information

    公开(公告)号:US20220256337A1

    公开(公告)日:2022-08-11

    申请号:US17618212

    申请日:2020-05-20

    IPC分类号: H04W12/037 H04W48/08 H04L9/30

    摘要: The embodiments herein relate to a method performed by a UE (103) for handling SI. The UE obtains one or multiple public keys for SI signature verification. Each of the one or multiple public keys is associated with a validity area of an access network where the public key is valid. The UE obtains a SI together with a SI signature from a network node (101) covering a cell. The SI comprises area identification information. The UE determines (103), based on the area identification information comprised in the SI, the validity area that the cell belongs to and the corresponding public key. The UE (103) verifies the SI signature using the determined corresponding public key.

    SECURITY CONTEXT IN A WIRELESS COMMUNICATION SYSTEM

    公开(公告)号:US20220086706A1

    公开(公告)日:2022-03-17

    申请号:US17533684

    申请日:2021-11-23

    摘要: Core network equipment is configured for use in a core network of a wireless communication system. The core network equipment is configured to switch switching to using a new non-access stratum, NAS, security context between a user equipment and the core network equipment. The core network equipment is also configured to, during or in association with a handover procedure for handover of the user equipment, signal from the core network equipment that the new NAS security context between the user equipment and the core network equipment is to be used as a basis for an access stratum (AS) security context between the user equipment and radio access network equipment.

    Creating a pseudonym for requesting a network slice

    公开(公告)号:US11228562B2

    公开(公告)日:2022-01-18

    申请号:US16651975

    申请日:2018-09-19

    摘要: A wireless device requests a network slice from a network by, first, identifying at least one network slice to be requested. Based on a mapping method that is specific to the wireless device, the wireless device forms a slice pseudonym for the or each network slice to be requested. The wireless device then transmits a request message to the network, wherein the request message comprises the or each slice pseudonym. The network node receives the request message sent by the wireless device, wherein the request message comprises at least one slice pseudonym. Based on a mapping method that is used by the wireless device and that is specific to the wireless device, the network node identifies at least one requested network slice from the or each received slice pseudonym. The network node then permits use of the requested network slice.