The present disclosure relates to a wireless network, and more specifically related to a method and a User Equipment (UE) for managing a Steering of Roaming (SoR) security check failure during a registration procedure in the wireless network.
5G mobile communication technologies define broad frequency bands such that high transmission rates and new services are possible, and can be implemented not only in “Sub 6 GHz” bands such as 3.5 GHz, but also in “Above 6 GHz” bands referred to as mmWave including 28 GHz and 39 GHz. In addition, it has been considered to implement 6G mobile communication technologies (referred to as Beyond 5G systems) in terahertz bands (for example, 95 GHz to 3 THz bands) in order to accomplish transmission rates fifty times faster than 5G mobile communication technologies and ultra-low latencies one-tenth of 5G mobile communication technologies.
At the beginning of the development of 5G mobile communication technologies, in order to support services and to satisfy performance requirements in connection with enhanced Mobile BroadBand (eMBB), Ultra Reliable Low Latency Communications (URLLC), and massive Machine-Type Communications (mMTC), there has been ongoing standardization regarding beamforming and massive MIMO for mitigating radio-wave path loss and increasing radio-wave transmission distances in mmWave, supporting numerologies (for example, operating multiple subcarrier spacings) for efficiently utilizing mmWave resources and dynamic operation of slot formats, initial access technologies for supporting multi-beam transmission and broadbands, definition and operation of BWP (BandWidth Part), new channel coding methods such as a LDPC (Low Density Parity Check) code for large amount of data transmission and a polar code for highly reliable transmission of control information, L2 pre-processing, and network slicing for providing a dedicated network specialized to a specific service.
Currently, there are ongoing discussions regarding improvement and performance enhancement of initial 5G mobile communication technologies in view of services to be supported by 5G mobile communication technologies, and there has been physical layer standardization regarding technologies such as V2X (Vehicle-to-everything) for aiding driving determination by autonomous vehicles based on information regarding positions and states of vehicles transmitted by the vehicles and for enhancing user convenience, NR-U (New Radio Unlicensed) aimed at system operations conforming to various regulation-related requirements in unlicensed bands, NR UE Power Saving, Non-Terrestrial Network (NTN) which is UE-satellite direct communication for providing coverage in an area in which communication with terrestrial networks is unavailable, and positioning.
Moreover, there has been ongoing standardization in air interface architecture/protocol regarding technologies such as Industrial Internet of Things (IIoT) for supporting new services through interworking and convergence with other industries, IAB (Integrated Access and Backhaul) for providing a node for network service area expansion by supporting a wireless backhaul link and an access link in an integrated manner, mobility enhancement including conditional handover and DAPS (Dual Active Protocol Stack) handover, and two-step random access for simplifying random access procedures (2-step RACH for NR). There also has been ongoing standardization in system architecture/service regarding a 5G baseline architecture (for example, service based architecture or service based interface) for combining Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) technologies, and Mobile Edge Computing (MEC) for receiving services based on UE positions.
As 5G mobile communication systems are commercialized, connected devices that have been exponentially increasing will be connected to communication networks, and it is accordingly expected that enhanced functions and performances of 5G mobile communication systems and integrated operations of connected devices will be necessary. To this end, new research is scheduled in connection with eXtended Reality (XR) for efficiently supporting AR (Augmented Reality), VR (Virtual Reality), MR (Mixed Reality) and the like, 5G performance improvement and complexity reduction by utilizing Artificial Intelligence (AI) and Machine Learning (ML), AI service support, metaverse service support, and drone communication.
Furthermore, such development of 5G mobile communication systems will serve as a basis for developing not only new waveforms for providing coverage in terahertz bands of 6G mobile communication technologies, multi-antenna transmission technologies such as Full Dimensional MIMO (FD-MIMO), array antennas and large-scale antennas, metamaterial-based lenses and antennas for improving coverage of terahertz band signals, high-dimensional space multiplexing technology using OAM (Orbital Angular Momentum), and RIS (Reconfigurable Intelligent Surface), but also full-duplex technology for increasing frequency efficiency of 6G mobile communication technologies and improving system networks, AI-based communication technology for implementing system optimization by utilizing satellites and AI (Artificial Intelligence) from the design stage and internalizing end-to-end AI support functions, and next-generation distributed computing technology for implementing services at levels of complexity exceeding the limit of UE operation capability by utilizing ultra-high-performance communication and computing resources.
Referring to the
Thus, it is desired to address the above mentioned disadvantages or other shortcomings or at least provide a useful alternative.
In line with development of the communication systems, there is a need for managing a Steering of Roaming (SoR) security check failure during a registration procedure in the wireless network. The principal object of the embodiments herein is to provide a method and UE for managing a SOR security check failure during a registration procedure in a wireless network.
Another object of the embodiments herein is to provide that the UE waits for services to complete, gracefully completes the services as per SOR-CMCI configuration and performs a PLMN selection when the registration type is the mobility registration.
Another object of the embodiments herein is to provide that the UE does not wait for a network to release and the UE aborts locally the signalling connection and performs PLMN selection, when the registration type is the initial registration.
Accordingly, the embodiment herein is to provide a method for managing SOR security check failure during a registration procedure in a wireless network. The method includes sending, by a UE in the wireless network, a registration request message to a network apparatus in the wireless network. Further, the method includes storing, by the UE, a registration type set by the UE while sending the registration request message to the network apparatus, wherein the registration type is one of a mobility registration updating and an initial registration. Further, the method includes receiving, by the UE, a registration accept message comprising a SOR-CMCI configuration or the SOR information. Further, the method includes determining, by the UE, a SOR security check failure. Further, the method includes applying, by the UE, a SOR security check failure based on the stored registration type and the stored SOR-CMCI configuration.
In an embodiment, applying, by the UE, a SOR security check failure based on the stored registration type and the stored SOR-CMCI configuration includes: determining, by the UE, whether the stored registration type is the mobility registration updating or the initial registration; applying the SOR security check failure for mobility registration procedure actions in response to determining the stored registration type is the mobility registration and the SOR-CMCI configuration is stored in the UE; and applying the SOR security check failure for initial registration procedure actions in response to determining the stored registration type is the initial registration or the SOR-CMCI configuration is not stored in the UE.
In an embodiment, applying the SOR security check failure for mobility registration procedure actions includes applying, by the UE, the SOR-CMCI configuration, starting, by the UE, a Tsor-CM timer, determining, by the UE, whether the Tsor-CM timer is expired, and performing, by the UE, Tsor-CM timer expiry actions in response to determining that the Tsor-CM timer is expired.
In an embodiment, the Tsor-Cm timer expiry actions comprises detecting, by the UE, that all the Tsor-Cm timer are expired or stopped, determining, by the UE, to perform a PLMN selection, determining, by the UE, that the UE is in the connected state, performing, by the UE, a Non-access stratum (NAS) procedure comprising deregistration procedure requesting release of all Protocol Data Unit (PDU) sessions and services, determining, by the UE, that the UE (100) enters in an IDLE mode, and attempting, by the UE, to obtain service on a higher priority PLMN by performing the PLMN selection procedure by considering a first VPLMN as lowest priority.
In an embodiment, the PLMN selection procedure is determined based on at least one of an ability of the UE to determine a higher priority PLMN than selected VPLMN in response to determining that a list of available and allowable PLMNs in an area is available at the UE, and an inability of the UE to determine a higher priority PLMN than selected VPLMN in response to determining that a list of available and allowable PLMNs in an area is not available at the UE.
In an embodiment, applying the SOR security check failure for initial registration procedure actions includes releasing, by the UE, the current N1 NAS signalling connection locally, attempting, by the UE, to obtain a service on a higher priority PLMN by indicating a timer T that controls periodic attempts has expired, with an exception that the current PLMN is considered as lowest priority, suspending, by the UE, a transmission of 5GSM messages until a N1 NAS signalling is released, determining, by the UE, whether the UE has an established emergency PDU session, and releasing, by the UE, a current N1 NAS signalling connection locally after the release of the emergency PDU session in response to determining that the UE has the established emergency PDU session.
Accordingly, the embodiment herein is to provide a UE for managing SOR security check failure during a registration procedure in a wireless network. The UE includes a SOR security check failure controller communicatively coupled to a memory and a processor. The SOR security check failure controller is configured to send a registration request message to a network apparatus in the wireless network. Further, the SOR security check failure controller is configured to store a registration type set by the UE while sending the registration request message to the network apparatus, wherein the registration type is one of a mobility registration updating and an initial registration. Further, the SOR security check failure controller is configured to receive a registration accept message comprises a Steering of roaming connected mode control information (SOR-CMCI) configuration or the SOR information. Further, the SOR security check failure controller is configured to determine that a SOR security check failure. Further, the SOR security check failure controller is configured to apply a SOR security check failure based on the stored registration type and the stored SOR-CMCI configuration.
These and other aspects of the embodiments herein will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings. It should be understood, however, that the following descriptions, while indicating preferred embodiments and numerous specific details thereof, are given by way of illustration and not of limitation. Many changes and modifications may be made within the scope of the embodiments herein without departing from the scope thereof, and the embodiments herein include all such modifications.
Advantages, and salient features of the invention will become apparent to those skilled in the art from the following detailed description, which taken in conjunction with the annexed drawings, discloses exemplary embodiments of the invention. Accordingly present invention, SoR security check failure can be performed efficiently.
The embodiments are illustrated in the accompanying drawings, throughout which like reference letters indicate corresponding parts in the various figures. The embodiments herein will be better understood from the following description with reference to the drawings, in which:
The embodiments herein and the various features and advantageous details thereof are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and detailed in the following description. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. Also, the various embodiments described herein are not necessarily mutually exclusive, as some embodiments can be combined with one or more other embodiments to form new embodiments. The term “or” as used herein, refers to a non-exclusive or, unless otherwise indicated. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein can be practiced and to further enable those skilled in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein.
As is traditional in the field, embodiments may be described and illustrated in terms of blocks which carry out a described function or functions. These blocks, which may be referred to herein as managers, units, modules, hardware components or the like, are physically implemented by analog and/or digital circuits such as logic gates, integrated circuits, microprocessors, microcontrollers, memory circuits, passive electronic components, active electronic components, optical components, hardwired circuits and the like, and may optionally be driven by firmware and software. The circuits may, for example, be embodied in one or more semiconductor chips, or on substrate supports such as printed circuit boards and the like. The circuits constituting a block may be implemented by dedicated hardware, or by a processor (e.g., one or more programmed microprocessors and associated circuitry), or by a combination of dedicated hardware to perform some functions of the block and a processor to perform other functions of the block. Each block of the embodiments may be physically separated into two or more interacting and discrete blocks without departing from the scope of the disclosure. Likewise, the blocks of the embodiments may be physically combined into more complex blocks without departing from the scope of the disclosure.
Accordingly, the embodiment herein is to disclose a method for managing SOR security check failure during a registration procedure in a wireless network. The method includes sending, by a UE in the wireless network, a registration request message to a network apparatus in the wireless network. Further, the method includes storing, by the UE, a registration type set by the UE while sending the registration request message to the network apparatus, wherein the registration type is one of a mobility registration updating and an initial registration. Further, the method includes receiving, by the UE, a registration accept message comprises a Steering of roaming connected mode control information (SOR-CMCI) configuration or the SOR information. Further, the method includes determining, by the UE, a SOR security check failure. Further, the method includes applying, by the UE, a SOR security check failure based on the stored registration type and the stored SOR-CMCI configuration.
Referring now to the drawings and more particularly to
The UE (100) sends a registration request message to the network apparatus (300) in the wireless network (1000). While sending the registration request message to the network apparatus (300), the UE (100) stores a registration type set by the UE (100). The registration type can be a mobility registration updating or an initial registration. Further, the UE (100) receives a registration accept message comprising the SOR-CMCI configuration or the SOR information and determines the SOR security check failure. Further, the UE (100) applies the SOR security check failure based on the stored registration type and stored SOR_CMCI configuration.
In an embodiment, the UE (100) determines whether the stored registration type is the mobility registration updating or the initial registration. In response to determining the stored registration type is the mobility registration and the UE has stored SOR_CMCI configuration, the UE (100) applies the SOR security check failure for mobility registration procedure actions. In an embodiment, the SOR security check failure for the mobility registration procedure actions is applied by applying the SOR-CMCI configuration, starting a Tsor-CM timer, determining that the Tsor-CM timer is expired, and performing the Tsor-CM timer expiry actions in response to determining that the Tsor-CM timer is expired. The Tsor-Cm timer expiry actions includes detect that all the Tsor-Cm timer are expired or stopped, determine to perform a PLMN selection, determine that the UE (100) is in a connected state, perform a NAS procedure comprising deregistration procedure requesting release of all PDU sessions and services, determine that the UE (100) enters in an IDLE mode, and attempt to obtain service on a higher priority PLMN by performing the PLMN selection procedure by considering a first VPLMN as lowest priority.
The PLMN selection procedure is determined based on at least one of an ability of the UE (100) to determine a higher priority PLMN than selected VPLMN in response to determining that a list of available and allowable PLMNs in an area is available at the UE (100), and an inability of the UE (100) to determine a higher priority PLMN than selected VPLMN in response to determining that a list of available and allowable PLMNs in an area is not available at the UE (100).
In response to determining the stored registration type is the initial registration or the there is no stored SOR_CMCI configuration, the UE (100) applies the SOR security check failure for initial registration procedure actions. The SOR security check failure for the initial registration procedure actions is applied by releasing the current N1 NAS signalling connection locally, attempting to obtain a service on a higher priority PLMN by indicating a timer that controls periodic attempts has expired, with an exception that the current PLMN is considered as lowest priority, suspending, a transmission of 5GSM messages until a N1 NAS signalling is released, determining whether the UE (100) has an established emergency PDU session, and releasing a current N1 NAS signalling connection locally after the release of the emergency PDU session in response to detraining that the UE (100) has the established emergency PDU session.
The SOR security check failure controller (140) is physically implemented by analog and/or digital circuits such as logic gates, integrated circuits, microprocessors, microcontrollers, memory circuits, passive electronic components, active electronic components, optical components, hardwired circuits and the like, and may optionally be driven by firmware.
The SOR security check failure controller (140) sends the registration request message to the network apparatus (300) in the wireless network (1000). While sending the registration request message to the network apparatus (300), the SOR security check failure controller (140) stores a registration type set by the UE (100). The registration type can be the mobility registration updating or the initial registration. Further, the SOR security check failure controller (140) receives the registration accept message comprises the SOR-CMCI configuration or the SOR information and determines the SOR security check failure. Further, the SOR security check failure controller (140) applies the SOR security check failure based on the stored registration type and stored SOR_CMCI configuration.
In an embodiment, the SOR security check failure controller (140) determines whether the stored registration type is the mobility registration updating or the initial registration. In response to determining the stored registration type is the mobility registration and the UE has a stored SOR_CMCI configuration, the SOR security check failure controller (140) applies the SOR security check failure for mobility registration procedure actions. In response to determining the stored registration type is the initial registration or SOR_CMCI configuration is not stored, the SOR security check failure controller (140) applies the SOR security check failure for initial registration procedure actions.
Further, the processor (110) is configured to execute instructions stored in the memory (130) and to perform various processes. The communicator (120) is configured for communicating internally between internal hardware components and with external devices via one or more networks. The memory (130) also stores instructions to be executed by the processor (110). The memory (130) may include non-volatile storage elements. Examples of such non-volatile storage elements may include magnetic hard discs, optical discs, floppy discs, flash memories, or forms of electrically programmable memories (EPROM) or electrically erasable and programmable (EEPROM) memories. In addition, the memory (130) may, in some examples, be considered a non-transitory storage medium. The term “non-transitory” may indicate that the storage medium is not embodied in a carrier wave or a propagated signal. However, the term “non-transitory” should not be interpreted that the memory (130) is non-movable. In certain examples, a non-transitory storage medium may store data that can, over time, change (e.g., in Random Access Memory (RAM) or cache).
Although the
At S402, the method includes sending the registration request message to the network apparatus (300) in the wireless network (1000). At S404, the method includes storing the registration type set by the UE (100) while sending the registration request message to the network apparatus (300). At S406, the method includes receiving the registration accept message comprising the SOR-CMCI configuration or the SOR information. At S408, the method includes determining the SOR security check failure based on the stored registration type and the stored SOR-CMCI configuration. At S410, the method includes determining whether the stored registration type is the mobility registration updating or the initial registration.
In response to the stored registration type is the mobility registration updating and there is stored SOR-CMCI configuration then, at S412, the method includes applying the SOR-CMCI configuration and starting the Tsor-CM timer. In response to determining the stored registration type is the mobility registration updating and the SOR-CMCI configuration is stored in the UE, the method includes applying the SOR security check failure for mobility registration procedure actions as indicates from S414-S416.
At S414, the method includes determining that all the Tsor-CM timer(s) are expired or stopped. At S416, the method includes performing the Tsor-CM timer expiry actions in response to determining that the Tsor-CM timer is expired.
In response to the stored registration type is the initial registration or the SOR-CMCI configuration is not stored in the UE, the method includes applying the SOR security check failure for initial registration procedure actions as indicated from S418-S426. At S418, the method includes releasing the current N1 NAS signaling connection locally. At S420, the method includes attempting to obtain the service on a higher priority PLMN by acting as it the timer that controls periodic attempts has expired, with an exception that the current PLMN is considered as lowest priority. At S422, the method includes suspending the transmission of 5GSM messages until the N1 NAS signaling is released. At S424, the method includes determining that the UE (100) has an established emergency PDU session. At S426, the method includes releasing the current N1 NAS signaling connection locally after the release of the emergency PDU session in response to determining that the UE (100) has the established emergency PDU session.
Unlike to the conventional methods and systems, as per the proposed method, once SoR security check is not successful (i.e. fails) over the received SOR information or SOR-CMCI information in the NAS message, the UE (100) shall wait until it moves to idle mode or 5GMM-CONNECTED mode with Radio Resource Control (RRC) inactive indication before attempting to obtain service on a higher priority PLMN by acting as if timer T that controls periodic attempts has expired if there are ongoing PDU sessions or services in the UE. In addition, the UE (100) may also check during registration procedure or DL NAS transport procedure or any NAS procedure in which UE may receive SOR information or the SOR_CMCI information and security check is not successful, if any voice or emergency or video call is ongoing or any data session is ongoing. If there are no ongoing PDU sessions or service ongoing, the UE (100) may locally release current N1 NAS Signalling and then attempt to obtain service on a higher priority PLMN by acting as if timer T that controls periodic attempt has expired.
Further, the method consists of following steps:
1. The UE (100) is having ongoing session i.e. PDU sessions or services for example voice call or SMS etc.
2. The UE (100) triggers a registration procedure for mobility and periodic registration update or the initial registration procedure.
3. The UE (100) receives a registration accept message.
4. The UE (100) performs a security check on the stored SOR information.
5. If the security check is not successful:
When the last running Tsor-cm timer stops or expires not due to the UE (100) entering idle mode or 5GMM-CONNECTED mode with RRC inactive indication, if:
3. Then the UE (100) shall perform the deregistration procedure that releases all the established PDU sessions and the UE (100) enters idle mode and attempts to obtain service on a higher priority PLMN as specified in TS 23.122 by acting as if timer T that controls periodic attempts has expired.
Steering of roaming connected mode control information (SOR-CMCI): HPLMN information to control the timing for the UE (100) in the connected mode to move to the idle mode in order to perform steering of roaming.
The Home Public Land Mobile Network (HPLMN), based on operator policy, may provide the UE (100) with SOR-CMCI to control the timing when the UE (100) enters the idle mode and perform the higher priority PLMN/access technology selection. This is achieved by the HPLMN indicating to the UE (100) the criteria for releasing specific PDU session(s) or services to enter idle mode. The HPLMN may configure the SOR-CMCI in the UE (100), and may also provide the SOR-CMCI to the UE (100) over N1 NAS signalling. The SOR-CMCI received over N1 NAS signalling takes precedence over the SOR-CMCI configured in the UE (100).
The security check is not successful (i.e. fails) if the UE's USIM is configured with indication that the UE (100) is to receive the steering of roaming information (SoR) due to initial registration in a VPLMN, but neither the list of preferred PLMN/access technology combinations nor the secured packet nor the HPLMN indication that ‘no change of the “Operator Controlled PLMN Selector with Access Technology” list stored in the UE (100) is needed and thus no list of preferred PLMN/access technology combinations is provided’ is received in the REGISTRATION ACCEPT message, when the UE (100) performs the initial registration in the VPLMN or if the steering of roaming information is received but the security check is not successful (i.e. if integrity check on the stored SOR information is not successful as defined in the TS 24.501).
There are two types of registration procedures as follows:
a) Registration procedure for initial registration; and
When the UE initiates the registration procedure for initial registration, the UE shall indicate “initial registration” in the 5GS registration type IE. When the UE initiates the registration procedure for emergency services, the UE shall indicate “emergency registration” in the 5GS registration type IE. When the UE initiates the initial registration for onboarding services in SNPN, the UE shall indicate “SNPN onboarding registration” in the 5GS registration type IE. When the UE initiates the initial registration procedure for disaster roaming services, the UE shall indicate “disaster roaming initial registration” in the 5GS registration type IE
b) Registration procedure for mobility and periodic registration update
When the UE initiates the registration procedure for mobility and periodic registration update for disaster roaming services, the UE shall indicate “disaster roaming mobility registration updating” in the 5GS registration type IE.
When the UE initiates the registration procedure for mobility and periodic registration update for periodic updating, the UE shall indicate “periodic registration updating” in the 5GS registration type IE otherwise the UE shall indicate “mobility registration updating”.
The aim of the solution discussed in the embodiments is for the UE to determine type of the registration procedure whether it is Registration procedure for initial registration or Registration procedure for mobility and periodic registration update. UE identifies the respective registration procedure using the 5GS registration type IE it had set in the registration request message. Based on the identified type of registration procedure the respective security check failure actions are performed.
Thus, in the embodiments 5GS registration type IE set to “initial registration” or “emergency registration” or “SNPN onboarding registration” or “disaster roaming initial registration” they all represent Registration procedure for initial registration, all have same meaning w.r.t to this embodiment and the security check failure actions are same i.e. SOR security check failure for initial registration procedure actions as described in this embodiment.
Similarly in this embodiment, 5GS registration type IE set to “disaster roaming mobility registration updating” or “periodic registration updating” or “mobility registration updating” they all represent the Registration procedure for mobility and periodic registration update, all have same meaning w.r.t to this embodiment and the security check failure actions are same i.e. SOR security check failure for mobility registration procedure actions as described in this embodiment.
The various actions, acts, blocks, steps, or the like in the flow charts (S400 and S500) may be performed in the order presented, in a different order or simultaneously. Further, in some embodiments, some of the actions, acts, blocks, steps, or the like may be omitted, added, modified, skipped, or the like without departing from the scope of the invention.
The foregoing description of the specific embodiments will so fully reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modification within the spirit and scope of the embodiments as described herein.
Number | Date | Country | Kind |
---|---|---|---|
202141021534 | May 2021 | IN | national |
202141021534 | Apr 2022 | IN | national |
This application is a 371 of International Application No. PCT/KR2022/006742 filed on May 11, 2022, which claims priority to India Patent Application No. 202141021534 filed on May 12, 2021, and India Patent Application No. 202141021534 filed on Apr. 26, 2022, the disclosures of which are herein incorporated by reference in their entirety.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/KR2022/006742 | 5/11/2022 | WO |