Method and user equipment for detecting degradation attack
A user equipment and degradation technology, applied in the field of communication, can solve the problems of not knowing the eNB, unable to judge whether the RRC/UP security algorithm list has been modified, low intensity, etc., and achieve the effect of preventing harm
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] In this embodiment, handover occurs between eNBs within the same access network EUTRAN, and the MME also changes.
[0039] Please refer to image 3 As shown, the specific process of this embodiment is:
[0040] Step 301, the source eNB decides to initiate a handover
[0041] Step 302, the source eNB sends a handover request (Handover Required) message to the source MME.
[0042] Step 303, the source MME sends a handover preparation request (Forward RelocationRequest) message to the target MME, and the handover preparation request message carries a list of security algorithms supported by the UE (including a list of NAS / RRC / UP algorithms), a list of security algorithms allowed by the system (including a list of NAS algorithms) / RRC / UP algorithm list), the currently selected security algorithm list (including NAS / RRC / UP algorithm list).
[0043] Step 304, the target MME sends a handover preparation request (Handover Request) message to the target eNB, and the handover ...
Embodiment 2
[0059] Embodiment 2: In this embodiment, handover occurs between eNBs within the same access network EUTRAN, and the MME also changes.
[0060] Please refer to Figure 4 As shown, this embodiment is similar to the first embodiment, and in terms of the specific process, steps 401-407 are the same as steps 301-307 in the first embodiment, and the difference starts from step 408.
[0061] Step 408, the target MME (via the source MME / source eNB) sends a separate integrity-protected NAS SMC (NAS Security Mode Command, NAS security mode command) message to the UE, and the integrity-protected NAS SMC message carries the configuration on the target MME The list of RRC / UP security algorithms allowed by the system.
[0062] In step 409, the UE returns a NAS SMC (NAS Security Mode Complete, NAS security mode complete) message to the target MME.
[0063] Step 410, the target MME sends a handover preparation response (Forward RelocationResponse) message to the source MME, the handover pr...
Embodiment 3
[0072] Embodiment 3: Switching from 2G / 3G to EUTRAN, switching between access network entities in different access networks, and changes in core network entities.
[0073] Please refer to Figure 5 As shown, the main difference between the present embodiment and the first embodiment is:
[0074] 1. In step 503, the source SGSN (the core network entity in the 2G / 3G network) sends a handover preparation request (Forward Relocation Request) message to the target MME, and the handover preparation request message only carries a list of security algorithms supported by the UE (including NAS / RRC / UP algorithm list).
[0075] 2. In step 507, the target MME selects an appropriate NAS security algorithm according to the list of NAS security algorithms supported by the UE, the list of NAS security algorithms allowed by the system on the target MME, and the list of supported NAS security algorithms configured on the target MME. Since the source SGSN only sends the list of security algor...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 