Methods and Apparatuses for Avoiding Denial of Service Attacks By Rogue Access Points
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatuses are provided for avoiding denial of service attacks by rogue access points. A method may include attempting to verify activation of access stratum security by an access point based at least in part upon integrity protection information included in a received security mode command message sent by the access point, wherein a radio connection has been established with the access point. The method may further include detecting an occurrence of a security activation deadlock. The method may additionally include determining that a predefined number of security activation deadlocks with the access point have occurred. The method may also include identifying the access point as a rogue access point based at least in part upon the determination that a predefined number of security activation deadlocks with the access point have occurred. Corresponding apparatuses are also provided.
36 Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A method comprising:
-
attempting to verify activation of access stratum security by an access point based at least in part upon integrity protection information included in a received security mode command message sent by the access point, wherein a radio connection has been established with the access point; detecting an occurrence of a security activation deadlock; determining that a predefined number of security activation deadlocks with the access point have occurred; and identifying the access point as a rogue access point based at least in part upon the determination that the predefined number of security activation deadlocks with the access point have occurred. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. An apparatus comprising at least one processor and at least one memory storing computer program code, wherein the at least one memory and stored computer program code are configured to, with the at least one processor, cause the apparatus to at least:
-
attempt to verify activation of access stratum security by an access point based at least in part upon integrity protection information included in a received security mode command message sent by the access point, wherein a radio connection has been established with the access point; detect an occurrence of a security activation deadlock; determine that a predefined number of security activation deadlocks with the access point have occurred; and identify the access point as a rogue access point based at least in part upon the determination that a predefined number of security activation deadlocks with the access point have occurred. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35)
-
-
36. A computer program product comprising at least one computer-readable storage medium having computer-readable program instructions stored therein, the computer-readable program instructions comprising:
-
a program instruction configured for attempting to verify activation of access stratum security by an access point based at least in part upon integrity protection information included in a received security mode command message sent by the access point, wherein a radio connection has been established with the access point; a program instruction configured for detecting an occurrence of a security activation deadlock; a program instruction configured for determining that a predefined number of security activation deadlocks with the access point have occurred; and a program instruction configured for identifying the access point as a rogue access point based at least in part upon the determination that a predefined number of security activation deadlocks with the access point have occurred. - View Dependent Claims (37, 38, 39, 40)
-
Specification