REDUCING LIKELIHOOD OF SUCCESSFUL DOS ATTACKS BY VALIDATING OVERLOAD CONTROL INFORMATION

    公开(公告)号:WO2023038756A1

    公开(公告)日:2023-03-16

    申请号:PCT/US2022/039977

    申请日:2022-08-10

    Abstract: The subject matter described herein includes a method for reducing the likelihood of successful denial of service (DoS) attacks by validating overload control information (OCI) scope information against network function (NF) profile information obtained using target resource identification information. The method includes receiving a service based interface (SB I) request message, obtaining, from the SBI request message, target resource identification information, obtaining NF profile information using the target resource identification information and storing the NF profile information, receiving an SBI response message including overload control information and scope information for the overload control information, using the stored NF profile information to determine whether the scope information for the overload control information is valid, and, in response to determining that the scope information for the overload control information is invalid, rejecting the SBI response message.

    PHYSICAL LAYER SECURITY ACTIVATION
    3.
    发明申请

    公开(公告)号:WO2023034689A1

    公开(公告)日:2023-03-09

    申请号:PCT/US2022/075145

    申请日:2022-08-18

    Abstract: Methods, systems, and devices for wireless communications are described. In some wireless communications systems, a user equipment (UE) may receive, from a base station, control signaling identifying a configuration of a set of time intervals for communication with the base station, the set of time intervals including a subset of the time intervals for which the UE is to perform a physical layer security procedure. In some cases, the UE may activate a timer associated with performing the physical layer security procedure in response to a trigger. The UE and the base station may communicate one or more messages using the physical layer security procedure, for example, in the subset of the time intervals identified by the control signaling, while the timer is active, or both. The physical layer security procedure may involve the UE performing physical layer security encoding, signal jamming, or both.

    基地局及び制御方法
    4.
    发明申请

    公开(公告)号:WO2022244658A1

    公开(公告)日:2022-11-24

    申请号:PCT/JP2022/019896

    申请日:2022-05-11

    Abstract: 基地局(200)は、競合ベースランダムアクセスプロシージャにおいてユーザ装置(100)から上りリンク共有チャネル上で送信されるメッセージを受信し、前記受信したメッセージが所定フォーマットに準拠している場合、前記受信したメッセージを前記競合ベースランダムアクセスプロシージャにおける競合解決用の識別データとして前記ユーザ装置に送り返すエコーバック処理を行う。前記基地局(200)は、前記受信したメッセージが前記所定フォーマットに準拠していない場合、前記エコーバック処理を行わない。

    确定攻击路径的防护方案的方法和装置

    公开(公告)号:WO2022205132A1

    公开(公告)日:2022-10-06

    申请号:PCT/CN2021/084561

    申请日:2021-03-31

    Abstract: 本申请公开了一种确定攻击路径的防护方案的方法和装置,属于网联汽车安全技术领域。该方法包括:在攻击路径的多个攻击路径防护方案中,确定满足信息安全条件的攻击路径防护方案;在满足所述信息安全条件的攻击路径防护方案中,确定满足防护成本条件的攻击路径防护方案,作为所述攻击路径的待使用防护方案。通过该方法可以使最终选择出的待使用防护方案既可以满足一定的信息安全要求达到较好的防护效果,又可以在一定程度上节省投入的防护成本。

    METHOD AND APPARATUS FOR MITIGATING MAN IN THE MIDDLE ATTACK IN WIRELESS NETWORK

    公开(公告)号:WO2022103160A1

    公开(公告)日:2022-05-19

    申请号:PCT/KR2021/016367

    申请日:2021-11-10

    Abstract: The present disclosure relates to a communication method and system for converging a 5th Generation (5G) communication system for supporting higher data rates beyond a 4th Generation (4G) system with a technology for Internet of Things (IoT). The method includes comparing plurality of parameters (e.g. TAI) received in message (e.g. initial NAS message, registration request, first protected NAS message) from UE and plurality of parameters (e.g. TAI) broadcasted/received/stored by AMF entity and/or genuine gNB. AMF entity and/or genuine gNB sends an accept message (e.g. NAS accept) or reject message (e.g. NAS reject, RRC reject or RRC reconfiguration.) with appropriate error cause value to UE to mitigate the MitM attack. Based on received message from AMF entity and/or genuine gNB, UE detects that UE is camped on genuine gNB or fake gNB. UE performs action(s) (e.g. cell reselection), when UE is camped on fake gNB/eNB to mitigate MitM attack.

    中継装置、端末及び中継方法
    8.
    发明申请

    公开(公告)号:WO2022045332A1

    公开(公告)日:2022-03-03

    申请号:PCT/JP2021/031696

    申请日:2021-08-30

    Inventor: 庄司 拓也

    Abstract: 基地局で障害が発生した場合に、端末が不適切なシステムに接続されることを抑制するために、本発明の中継装置は、基地局で障害が生じた場合に、前記基地局を介してネットワークに接続していた端末に認証情報を含む接続要求を送信する送信手段と、前記接続要求を受信した前記端末から接続を許可する旨の通知を受信する受信手段と、前記受信手段から前記通知を受信した旨が通知された場合、前記端末と前記ネットワークとの間の通信を中継する中継手段と、を備える。

    ROGUE NETWORK FUNCTION RE-AUTHORIZATION IN A COMMUNICATION NETWORK

    公开(公告)号:WO2022018581A1

    公开(公告)日:2022-01-27

    申请号:PCT/IB2021/056352

    申请日:2021-07-14

    Abstract: Techniques for preventing rogue network functions in a communication network are provided. For example, a method comprises obtaining information identifying one or more network entities suspected of malicious activity operating within the communication network, causing a re-authorization of the one or more network entities suspected of malicious activity, and in response to a re- authorization failure of at least one of the one or more network entities suspected of malicious activity, causing one or more remedial actions to occur within the communication network to prevent the at least one network entity that failed re-authorization from accessing other network entities in the communication network.

Patent Agency Ranking