17768658. METHOD AND USER EQUIPMENT FOR DETERMINING WHETHER BASE STATION IS GENUINE OR ROUGE IN WIRELESS NETWORK simplified abstract (Samsung Electronics Co., Ltd.)

From WikiPatents
Jump to navigation Jump to search

METHOD AND USER EQUIPMENT FOR DETERMINING WHETHER BASE STATION IS GENUINE OR ROUGE IN WIRELESS NETWORK

Organization Name

Samsung Electronics Co., Ltd.

Inventor(s)

Rajavelsamy Rajadurai of Bangalore (IN)

Anil Agiwal of Bangalore (IN)

Fasil Abdul Latheef of Bangalore (IN)

Mangesh Abhimanyu Ingale of Bangalore (IN)

Rohini Rajendran of Bangalore (IN)

METHOD AND USER EQUIPMENT FOR DETERMINING WHETHER BASE STATION IS GENUINE OR ROUGE IN WIRELESS NETWORK - A simplified explanation of the abstract

This abstract first appeared for US patent application 17768658 titled 'METHOD AND USER EQUIPMENT FOR DETERMINING WHETHER BASE STATION IS GENUINE OR ROUGE IN WIRELESS NETWORK

Simplified Explanation

The present disclosure describes a method and system for integrating a 5th-Generation (5G) communication system with Internet of Things (IoT) technology, enabling various intelligent services such as smart home, smart city, and connected car applications.

  • Method for determining the authenticity of a base station in a wireless network:
 - If the received authentication key matches the key generated in the UE, the base station is identified as genuine and normal procedures are carried out.
 - If the received key does not match, the base station is identified as rogue.
 - Authentication key can be a digital signature, MAC-I, or a hash of MIB/SIBs including PCI.
    • Potential Applications:**

- Smart home automation - Smart city infrastructure management - Connected car technology - Health care services - Digital education platforms

    • Problems Solved:**

- Ensuring secure communication in wireless networks - Preventing unauthorized access to network resources - Protecting user data and privacy

    • Benefits:**

- Enhanced security in wireless communication - Seamless integration of 5G and IoT technologies - Facilitation of various intelligent services - Improved reliability and trustworthiness of network infrastructure

    • Potential Commercial Applications:**
  • Enhancing security in IoT devices and networks for businesses
  • Providing secure communication solutions for smart city projects
    • Possible Prior Art:**

- Previous methods for authenticating base stations in wireless networks - Existing technologies for securing IoT devices and networks

    • Unanswered Questions:**
    • 1. How does this method impact the overall performance of the wireless network?**

- Answer: The method enhances security and reliability, potentially improving network performance by preventing unauthorized access and ensuring data integrity.

    • 2. Are there any potential vulnerabilities or limitations associated with this authentication method?**

- Answer: While the method enhances security, there may be challenges in managing and updating authentication keys across a large number of base stations, which could introduce vulnerabilities if not properly addressed.


Original Abstract Submitted

The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. Embodiments herein provide a method for determining whether a base station is genuine or rouge in a wireless network. If a received authentication key matches with the authentication key generated in the UE, the method includes identifying a base station as genuine base station and carrying out a normal procedure. If the received authentication key does not match with the generated authentication key, the method includes identifying the base station as a rouge base station. The authentication key can be a digital signature (DS), a Message Authentication Code-Integrity (MAC-I), and a hash of MIB/SIBs including PCI.