Identification of a manipulated or defect base station during handover
First Claim
1. A method performed by a core network node of a communication network for detection of a manipulated or defective status of a source base station in connection with a handover of a user equipment (UE) to a target base station, said method comprising:
- receiving and storing a Prioritized Algorithm List (PAL) from the network, said list listing algorithms allowed for use when communicating with said UE in order of priority;
receiving and storing UE security capabilities (SCAP) from said UE;
receiving, from said target base station, UE SCAP related information of said UE, said UE SCAP related information having been reported from the source base station to said target base station previously during said handover; and
verifying the UE SCAP related information received from the target base station in order to detect a manipulated or defective status of the source base station by comparing at least part of said stored UE SCAP to the UE SCAP related information.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of and arrangement for detecting a manipulated or defect base station of a communication network is disclosed, wherein a target base station, having selected one or more algorithms on the basis of a prioritized algorithm list (PAL) and a UE security capabilities (SCAP), reports UE SCAP related information to a core network node. The core network node having knowledge of the UE SCAP compares this information or parts of this information with the retrieved UE SCAP related information in order to be able to identify a manipulated or defect base station when a comparison fails to match.
119 Citations
9 Claims
-
1. A method performed by a core network node of a communication network for detection of a manipulated or defective status of a source base station in connection with a handover of a user equipment (UE) to a target base station, said method comprising:
-
receiving and storing a Prioritized Algorithm List (PAL) from the network, said list listing algorithms allowed for use when communicating with said UE in order of priority; receiving and storing UE security capabilities (SCAP) from said UE; receiving, from said target base station, UE SCAP related information of said UE, said UE SCAP related information having been reported from the source base station to said target base station previously during said handover; and verifying the UE SCAP related information received from the target base station in order to detect a manipulated or defective status of the source base station by comparing at least part of said stored UE SCAP to the UE SCAP related information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A core network node of a communication network that is configured to detect a manipulated or defective status of a source base station in connection with a handover of a user equipment (UE) to a target base station, said core network node comprising:
-
receiving circuitry that is configured for receiving a Prioritized Algorithm List (PAL) from the network and storing said PAL, said list listing algorithms allowed for use when communicating with said UE in order of priority, for receiving UE security capabilities (SCAP) from said UE and for storing said UE SCAP; receiving circuitry that is configured for receiving UE SCAP related information of said UE from said target base station, said UE SCAP having been reported from the source base station to said target base station previously during said handover; and verifying circuitry that is configured for verifying the UE SCAP related information received from the target base station in order to detect whether the source base station has a manipulated or defective status by comparing at least part of said stored UE SCAP to the UE SCAP related information. - View Dependent Claims (9)
-
Specification