Supercharge Your Innovation With Domain-Expert AI Agents!

Identification of a manipulated or defect base station during handover

A flawed, base station technology, applied in security devices, electrical components, transmission systems, etc., can solve problems such as inability to detect sequences, increase UE complexity, etc., and achieve high-granularity effects

Active Publication Date: 2015-05-06
TELEFON AB LM ERICSSON (PUBL)
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method encounters the following problem: it is impossible for the target eNB or UE to detect whether the source eNB has modified the order of the algorithms in the allowed algorithm network list
However, a match does not necessarily mean that the information about UE capabilities received from the source eNodeB has not been modified
Furthermore, this UE-based approach provided in S3-070554 involves additional messages between the UE and the MME, which increases the complexity of the UE

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification of a manipulated or defect base station during handover
  • Identification of a manipulated or defect base station during handover
  • Identification of a manipulated or defect base station during handover

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Briefly, the present invention relates to a method for detecting manipulated or defective base stations during a handover procedure. The invention also relates to a core network node suitable for carrying out the proposed method and a base station suitable for helping to carry out the proposed method. It is to be noted that even though the description herein is provided in the context of E-UTRAN, it is equally applicable where a central network node provides a set of algorithm choices to any kind of radio base station, thereby selecting one or more of the algorithms for protecting them Any system on the link with the UE. Therefore, the following E-UTRAN context should only be considered as an illustrative example of one application of the proposed invention. In particular, it is to be noted that the specific messages mentioned in the example of passing information between entities involved in handover are considered to be exemplary examples only, and thus other alterna...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of and arrangement for detecting a manipulated or defect base station of a communication network is disclosed, wherein a target base station, having selected one or more algorithms on the basis of a prioritized algorithm list (PAL) and a UBE security capabilities (SCAP), reports UE SCAP related information to a core network node. The core network node having knowledge of the UE SCAP compares this information or parts of this information with the retrieved UE SCAP related information in order to be able to identify a manipulated or defect base station when a comparison fails to match.

Description

technical field [0001] The present invention relates to the detection of manipulated or defective base stations in cellular telecommunication networks. Background technique [0002] 3GPP is currently standardizing Long Term Evolution (LTE) as a continuation of 3G networks. In LTE, encryption and integrity protection of user plane and radio resource control data is performed by a base station, commonly referred to in this context as an evolved Node B (eNB). When the communication link of a terminal, ie User Equipment (UE), is handed over from one eNB to another, the source eNB informs the target eNB about which algorithms the UE supports and which algorithms are allowed to be used by the network. From the algorithms allowed by the network and supported by the UE and the target eNB, the target eNB selects the algorithm considered to be the best according to the predefined selection criteria. [0003] In this case, the compromising source eNB may modify the list to indicate w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/10H04L29/06
CPCH04W12/10H04W12/12H04W36/0083H04W36/34H04W88/08H04W12/108H04W12/122
Inventor K·诺尔曼B·(B·)斯米茨R·布洛姆
Owner TELEFON AB LM ERICSSON (PUBL)
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More