Samsung electronics co., ltd. (20240114337). METHOD AND USER EQUIPMENT FOR DETERMINING WHETHER BASE STATION IS GENUINE OR ROUGE IN WIRELESS NETWORK simplified abstract

From WikiPatents
Jump to navigation Jump to search

METHOD AND USER EQUIPMENT FOR DETERMINING WHETHER BASE STATION IS GENUINE OR ROUGE IN WIRELESS NETWORK

Organization Name

samsung electronics co., ltd.

Inventor(s)

Rajavelsamy Rajadurai of Bangalore (IN)

Anil Agiwal of Bangalore (IN)

Fasil Abdul Latheef of Bangalore (IN)

Mangesh Abhimanyu Ingale of Bangalore (IN)

Rohini Rajendran of Bangalore (IN)

METHOD AND USER EQUIPMENT FOR DETERMINING WHETHER BASE STATION IS GENUINE OR ROUGE IN WIRELESS NETWORK - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240114337 titled 'METHOD AND USER EQUIPMENT FOR DETERMINING WHETHER BASE STATION IS GENUINE OR ROUGE IN WIRELESS NETWORK

Simplified Explanation

The present disclosure relates to a communication method and system for converging a 5th-generation (5G) communication system for supporting higher data rates beyond a 4th-generation (4G) system with a technology for Internet of Things (IoT). The method includes determining whether a base station is genuine or rogue in a wireless network by comparing received authentication keys with authentication keys generated in the user equipment (UE).

  • Method for authenticating base stations in a wireless network:
   - If received authentication key matches with the key generated in the UE, identify the base station as genuine and proceed with normal procedures.
   - If received authentication key does not match, identify the base station as rogue.
   - Authentication key can be a digital signature (DS), a message authentication code-integrity (MAC-I), or a hash of MIB/SIBs including PCI.

Potential Applications

The technology can be applied in various intelligent services based on 5G communication and IoT, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security, and safety services.

Problems Solved

1. Ensuring the authenticity of base stations in a wireless network. 2. Preventing unauthorized access and potential security threats in communication systems.

Benefits

1. Enhanced security in wireless communication networks. 2. Reliable authentication process for base stations. 3. Facilitates the deployment of IoT technologies in conjunction with 5G networks.

Potential Commercial Applications

The technology can be utilized by telecommunications companies, IoT service providers, smart home automation companies, and security firms to enhance the security and reliability of their services.

Possible Prior Art

Prior art may include authentication methods for wireless networks, security protocols for communication systems, and technologies for integrating IoT with communication networks.

Unanswered Questions

How does this technology impact the speed and efficiency of data transmission in 5G networks?

The abstract does not provide specific details on how the authentication process affects the speed and efficiency of data transmission in 5G networks. Further information on the performance implications of this technology would be beneficial for understanding its overall impact on network operations.

What measures are in place to prevent potential vulnerabilities in the authentication process?

While the abstract mentions the authentication methods used, it does not elaborate on any additional security measures implemented to safeguard against potential vulnerabilities in the authentication process. Understanding the comprehensive security protocols in place would be crucial for assessing the robustness of the technology.


Original Abstract Submitted

the present disclosure relates to a communication method and system for converging a 5th-generation (5g) communication system for supporting higher data rates beyond a 4th-generation (4g) system with a technology for internet of things (iot). the present disclosure may be applied to intelligent services based on the 5g communication technology and the iot-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. embodiments herein provide a method for determining whether a base station is genuine or rouge in a wireless network. if a received authentication key matches with the authentication key generated in the ue, the method includes identifying a base station as genuine base station and carrying out a normal procedure. if the received authentication key does not match with the generated authentication key, the method includes identifying the base station as a rouge base station. the authentication key can be a digital signature (ds), a message authentication code-integrity (mac-i), and a hash of mib/sibs including pci.