This disclosure relates generally to mobile communication security, and, more particularly, to methods and apparatus to improve security of a virtual private mobile network.
In recent years, mobile network service providers have developed, expanded and maintained a mobile network infrastructure to support a rapidly growing customer base. Wireless telephones that depend on the mobile network infrastructure may communicate more than voice traffic. For example, virtual devices may communicate video, data, text and/or electronic mail (e-mail) messages. Such an expanded suite of wireless telephone functionality provides users with an opportunity to manage work e-mail, work data servers and/or other work related services, personal e-mail and/or personal finance services (e.g., web-based banking) on the same or multiple mobile devices.
The robust functionality of recently commercialized wireless telephones (e.g., smart phones such as the iPhone and/or Android), when supported by appropriate mobile network infrastructure, facilitates legitimate access to work related information, legitimate access to personal information and/or legitimate access to financial access information. However, the robust functionality of the wireless telephone also introduces a degree of risk to such work related information, personal information and/or financial information in the event that the mobile network infrastructure is compromised.
Methods, apparatus, and articles of manufacture are disclosed, which improve security of a virtual private mobile network. An example method includes identifying a request to initialize the virtual private mobile network, identify a number of subgroups to associate with the virtual private mobile network, generating a virtualized slice count value based on the number of subgroups, and initializing network elements with a number of virtualized slices based on the virtualized slice count value.
Virtual Private Mobile Networks (VPMNs) provide isolated mobile network services to one or more different user groups by, in part, dividing network resources into one or more virtualized instances. For example, in the event a VPMN is implemented to support two separate groups of users, such as government employees/users and non-government employees/users, then the VPMN may be configured to facilitate two separate virtual instances for each network resource. Network resources that support virtualization may include, but are not limited to, mobility management entities (MMEs), home subscriber servers (HSSs), evolved node Bs (eNBs), serving gateways, public data network (PDN) gateways and/or policy and charging rules function (PCRF) nodes. In operation, such a VPMN provides isolation between the example government and non-government users and establishes a virtual tunnel in which traffic will share network resources without providing access to the data of the first group to the second and vice-versa. In other words, the government users and the non-government users may use different virtual tunnels that are logically separate from the other.
At least one benefit of establishing a first VPMN (e.g., a first virtualized instance) for the example government workers and a second VPMN (e.g., a second virtualized instance) for the example non-government workers is that, in the event one of the VPMNs is compromised (e.g., by hackers), the other (e.g., non-hacked) VPMN will be unaffected. The virtualized instances are managed by, for example, a virtualization manager to time-slice (e.g., allocate) underlying hardware resources for each VPMN. As such, while the VPMN associated with the government workers is under attack (e.g., a denial of service (DoS attack) such that a given attacked resource is inundated with excessive traffic), the designated time-slice of that network resource allocated to the non-government users by the virtualization manager is not inundated by the DoS attack.
While separation of network resources via one or more virtualization techniques allows corresponding separation of differing groups of users that share the underlying network components, each established VPMN operates as a single point of failure for the whole group that may be sharing one virtualized instance. In other words, in the event a single government user account and/or user equipment (e.g., wireless telephone, mobile device) is compromised, then all members of the VPMN associated with that government user account are at risk and suffer the negative effects of the attack (e.g., decreased network responsivity due to the DoS attack(s)). Methods, apparatus, systems and/or articles of manufacture disclosed herein overcome such problems by providing isolation within an example group of users of a same VPMN that may be sharing the hardware resources of the network components that facilitate wireless services, thereby improving the security of the VPMN instance(s).
In operation, the example mobile network 100 of
However, while the UEs associated with the second group 104 may remain unaffected a the compromising act (e.g., DoS attack) associated with the first group 102 using the first virtualized slice 120, the totality of UEs in the attacked group are negatively affected by such an attack. The totality of the UEs in the attacked group are at a greater risk because, in part, they share a common point of failure (e.g., any of the slices 120, 122) with the totality of the attacked group. More specifically, UEs associated with a group may access a virtualized slice (e.g., slice 120 or slice 122) via an IP address and port number and/or a corresponding spectrum range. When the IP address/port number and/or spectrum range is compromised, it becomes a single point of failure for the whole group that is utilizing the corresponding virtualized slice (e.g., slice 120 or slice 122).
Methods, apparatus, systems and/or articles of manufacture disclosed herein improve security of a virtual private mobile network by, in part, reducing and/or minimizing the negative effects of one or more attacks to one or more members of a VPNM group (e.g., one or more UEs). In the illustrated example of
In operation, the plurality of UEs associated with the first VPMN group 202 are associated with one of the subgroups of the VPMN and, thus, with a corresponding subset of virtualized slices assigned to service the first VPMN group. Similarly, the plurality of UEs associated with the second VPMN group 204 are associated with one of the subgroups of the VPMN and, thus, with a corresponding subset of virtualized slices assigned to service the second VPMN group. As such, in the event one of the UEs is compromised, only the subgroup associated with that user, as opposed to the entire VPMN group, is affected by the compromise (e.g., a DoS attack). Assignment of UEs to subgroups may be done in any manner (e.g., randomly, pursuant to a formula, etc.).
The example mobile network 200 of
To set up VPMNs, the example VPMN manager 224 of
Continuing with the above example, in which two groups are identified (i.e., a government group 202 and a non-government group 204), the example VPMN manager 224 of
In the illustrated example of
The network component manager 310 of the illustrated example may be communicatively connected to some or all of the network elements of the example mobile network environment 200. Based on the resulting number of virtualized slices calculated by the slice calculator 304, the network component manager 310 instructs each network element utilized in the corresponding VPMN to generate the corresponding quantity of virtualized slices. For example, the network component manager 310 of
The initialized virtualized slices are associated with a UE in response to that UE requesting to utilize the example mobile network environment 200. For example, request from an authorized UE by the example user equipment interface 312, which identifies the VPMN group, and searches the example mapping table database 308 to determine if the requesting UE has a subgroup assignment in a mapping table stored in the database 308. If not, then the example mapping table manager 306 assigns the requesting UE to one of the subgroups associated with the corresponding VPMN group and updates the mapping table stored in the mapping table database 308. Additionally, the network component manager 310 of the illustrated example propagates the assignment to each of the network elements in the example mobile network environment 200.
In some examples, the mapping table manager 306 assigns members of one VPMN group to all odd numbered virtual slices, and assigns members of another VPMN group to all even numbered virtual slices. In other examples, the mapping table manager 306 assigns a consecutive number of virtualized slices to each corresponding VPMN group.
In some examples, the mapping table manager 306 assigns each requesting UE to a subgroup (and corresponding virtualized slice) based on an indication of slice load to facilitate load balancing of the plurality of virtualized slices. In the event that the example network component manager 310 of
Other examples of UE and/or group assignment may occur in a randomized manner. As described above, each virtualized slice may be associated with a corresponding IP address and port number. While a hacker may compromise one virtualized slice based on knowledge of the IP address and port number, the example mapping table manager 306 may randomly assign virtualized slices to the VPMN group so that attempts to seek consecutive IP addresses and/or port numbers near the compromised IP address and/or port number do not reach in a valid virtualized slice.
While an example manner of implementing the example mobile network 200 has been illustrated in
Flowcharts representative of example machine readable instructions for implementing the system 200 of
As mentioned above, the example processes of
The program 400 of
The program 410 of
An example mapping table is shown below as Table 1, in which the example mapping table manager 306 assigned the twenty-four virtualized slices (i.e., subgroups) to either the VPMN group of government users or the group of non-government users in a random manner.
In the illustrated example of Table 1, the mapping table generator has assigned slices 1, 2, 4, 7, 10-15, 17 and 20 to the government VPMN user group in a random manner. The mapping table is stored to the example mapping table database 308 to facilitate later retrieval when configuring the example mobile network 200. For example, after the mapping table is generated by the example mapping table manager 306, the example network component manager 310 updates the network elements with the corresponding information for the virtualized slices based on the mapping table (block 452). As such, each of the network elements employs the same mapping table configuration during operation.
The program 500 of
For example, returning to the example Table 1, a UE column identifies whether a corresponding virtualized slice has a corresponding UE assigned to it. In the illustrated example of Table 1, UEs identified as “A,” “G,” “Q,” and “F” are authorized to operate with virtualized slice number 1. Additionally, UEs identified as “T,” “N,” and “B” are authorized to operate with virtualized slice number 2, and UEs identified as “Z,” “S,” and “L” are authorized to operate with virtualized slice number 5. While the illustrated example of Table 1 identifies each UE with letters, such nomenclature is arbitrary and has been shown for purposes of illustration and not limitation. For example, each of the UEs identified in the UE column may include an international mobile equipment identity (IMEI) number, an electronic serial number (ESN), and/or any other identifier to identify the UE in a unique manner. In response to identifying a UE match in the mapping table (block 506), the example user equipment interface 312 authorizes the UE to use the corresponding VPMN of the mobile network 200 via the previously assigned virtualized slice (block 508). Such authorization may be propagated, by the example network component manager 310, to all the network elements of the mobile network 200 that have virtualized slices for the corresponding subgroup (block 510).
In the event that the user equipment interface 312 learns, after querying the example mapping table database 308, that the requesting UE has not been previously assigned to a virtualized slice (block 506), then the mapping table manager 306 applies one or more assignment rule(s) to assign the UE to a subgroup (block 512). For example, if the UE having an identifier “V” is absent from the example Table 1 above, then the UE has not been previously assigned to any virtualized slice in the example mobile network 200 (block 506). Assuming that the UE associated with the identifier “V” is associated with the VPMN group of government users, then the example mapping table manager 306 applies one or more assignment rules to determine which virtualized slice/subgroup to associate with UE “V” (block 512). In some examples, the assignment rule(s) may address load balancing concerns by distributing virtualized slices in a manner that reduces, avoids and/or minimizes the load(s) of already burdened slices based on load balancing information (e.g., threshold limits of a number of UEs per slice that allow acceptable performance of the network element). In the example of Table 1, virtualized slice 1, which is associated with government users, already supports four separate UEs (i.e., “A,” “G,” “Q,” and “F”). To prevent virtualized slice 1 from becoming inundated with too many UEs (e.g., as determined by performance metrics for virtualization performance), the mapping table manager 306 may assign UE “V” to a virtualized slice/subgroup that does not already have any assignment and/or that is less burdened than slice 1. For example, the mapping table manager 306 may select virtualized slice 4 because it does not have any assigned UEs. In other examples, the mapping table manager 306 may associate UEs to virtualized slices in a random manner (e.g., via a random number generator) and/or any other approach, which may or may not be influenced by load balancing information.
To associate the UE with a virtualized slice, the mapping table manager 306 updates the mapping table to reflect the association and stores the table to the mapping table database 308 (block 514). The example user equipment interface 312 authorizes the UE to utilize the assigned virtualized slice (block 516) and the updated mapping table is propagated to all of the network elements in the mobile network 200 by the example network component manager 310 (block 510).
The processor platform P100 of the instant example includes a processor P105. For example, the processor P105 can be implemented by one or more Intel® microprocessors. Of course, other processors from other families are also appropriate.
The processor P105 is in communication with a main memory including a volatile memory P115 and a non-volatile memory P120 via a bus P125. The volatile memory P115 may be implemented by Synchronous Dynamic Random Access Memory (SDRAM), Dynamic Random Access Memory (DRAM), RAMBUS Dynamic Random Access Memory (RDRAM) and/or any other type of random access memory device. The non-volatile memory P120 may be implemented by flash memory and/or any other desired type of memory device. Access to the main memory P115, P120 is typically controlled by a memory controller.
The processor platform P100 also includes an interface circuit P130. The interface circuit P130 may be implemented by any type of past, present or future interface standard, such as an Ethernet interface, a universal serial bus (USB), and/or a PCI express interface.
One or more input devices P135 are connected to the interface circuit P130. The input device(s) P135 permit a user to enter data and commands into the processor P105. The input device(s) can be implemented by, for example, a keyboard, a mouse, a touchscreen, a track-pad, a trackball, isopoint and/or a voice recognition system.
One or more output devices P140 are also connected to the interface circuit P130. The output devices P140 can be implemented, for example, by display devices (e.g., a liquid crystal display, and/or a cathode ray tube display (CRT)). The interface circuit P130, thus, typically includes a graphics driver card.
The interface circuit P130 also includes a communication device, such as a modem or network interface card to facilitate exchange of data with external computers via a network (e.g., an Ethernet connection, a digital subscriber line (DSL), a telephone line, coaxial cable, a cellular telephone system, etc.).
The processor platform P100 also includes one or more mass storage devices P150 for storing software and data. Examples of such mass storage devices P150 include floppy disk drives, hard drive disks, compact disk drives and digital versatile disk (DVD) drives.
The coded instructions of
From the foregoing, it will be appreciated that disclosed methods, apparatus, systems and/or articles of manufacture allow a mobile network to operate with improved security by, isolating the negative effects of a security breach within a VPMN to a subset of a group of mobile users sharing the VPMN. While a hacker may compromise one or more virtualized slices of the example mobile network 200, the entire group will not be negatively affected by such hacking activities in view of the subgroup isolation provided within the VPMN by example methods, apparatus, systems and/or articles of manufacture disclosed herein.
Although certain example methods, apparatus and articles of manufacture have been described herein, the scope of coverage of this patent is not limited thereto. On the contrary, this patent covers all methods, apparatus and articles of manufacture fairly falling within the scope of the claims of this patent.
This patent arises as a continuation of U.S. patent application Ser. No. 13/170,845, filed Jun. 28, 2011, issued as U.S. Pat. No. 9,172,678 on Oct. 27, 2015, which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
6438367 | Crawford | Aug 2002 | B1 |
6701437 | Hoke et al. | Mar 2004 | B1 |
6738910 | Genty et al. | May 2004 | B1 |
6981157 | Jakobsson et al. | Dec 2005 | B2 |
7155518 | Forslöw | Dec 2006 | B2 |
7243148 | Keir et al. | Jul 2007 | B2 |
7246232 | Dutertre | Jul 2007 | B2 |
7373150 | Cho et al. | May 2008 | B2 |
7486735 | Dubuc et al. | Feb 2009 | B2 |
7536691 | Kavoori et al. | May 2009 | B2 |
7558877 | Fedyk et al. | Jul 2009 | B1 |
7640338 | Huitema et al. | Dec 2009 | B2 |
7756042 | Guo et al. | Jul 2010 | B2 |
7783756 | Choyi et al. | Aug 2010 | B2 |
7792935 | Karjanlahti | Sep 2010 | B2 |
7870604 | Guichard et al. | Jan 2011 | B1 |
7882247 | Sturniolo et al. | Feb 2011 | B2 |
7929407 | Ma et al. | Apr 2011 | B2 |
7995994 | Khetawat et al. | Aug 2011 | B2 |
8072920 | Heo et al. | Dec 2011 | B2 |
8073428 | Khetawat et al. | Dec 2011 | B2 |
8089993 | Wei et al. | Jan 2012 | B2 |
8095138 | Matsumoto et al. | Jan 2012 | B2 |
RE43277 | Jung et al. | Mar 2012 | E |
8316428 | Kozat et al. | Nov 2012 | B2 |
8351948 | Kokku et al. | Jan 2013 | B2 |
8478891 | Breau et al. | Jul 2013 | B1 |
9172678 | Wang et al. | Oct 2015 | B2 |
20030050070 | Mashinsky | Mar 2003 | A1 |
20040177157 | Mistry et al. | Sep 2004 | A1 |
20050193103 | Drabik | Sep 2005 | A1 |
20050216590 | Aubin et al. | Sep 2005 | A1 |
20070287417 | Abramovich | Dec 2007 | A1 |
20080052779 | Sinha et al. | Feb 2008 | A1 |
20080244743 | Largman et al. | Oct 2008 | A1 |
20090205046 | Radosavac et al. | Aug 2009 | A1 |
20100057485 | Luft | Mar 2010 | A1 |
20100091641 | Gaal et al. | Apr 2010 | A1 |
20100281251 | Arauz Rosado | Nov 2010 | A1 |
20110026392 | Wen et al. | Feb 2011 | A1 |
20110035796 | Khalid et al. | Feb 2011 | A1 |
20110134861 | Seo et al. | Jun 2011 | A1 |
20110154101 | Merwe et al. | Jun 2011 | A1 |
20110164492 | Ma et al. | Jul 2011 | A1 |
20110194551 | Lee et al. | Aug 2011 | A1 |
20110200129 | Hwang et al. | Aug 2011 | A1 |
20110249644 | Boariu et al. | Oct 2011 | A1 |
20110250900 | Kokku et al. | Oct 2011 | A1 |
20110271112 | Bajko et al. | Nov 2011 | A1 |
20120002620 | Kokku | Jan 2012 | A1 |
20120051296 | Kokku | Mar 2012 | A1 |
20120060029 | Fluhrer et al. | Mar 2012 | A1 |
20120131653 | Pasquero et al. | May 2012 | A1 |
20120176982 | Zirwas | Jul 2012 | A1 |
20120216242 | Uner et al. | Aug 2012 | A1 |
20120224691 | Purohit | Sep 2012 | A1 |
20120233302 | Kallin et al. | Sep 2012 | A1 |
20120270523 | Laudermilch et al. | Oct 2012 | A1 |
20130029641 | Hickie | Jan 2013 | A1 |
20130064197 | Novak et al. | Mar 2013 | A1 |
20130080645 | Paul et al. | Mar 2013 | A1 |
20130084830 | Paul et al. | Apr 2013 | A1 |
20140254545 | Novak et al. | Sep 2014 | A1 |
Entry |
---|
Bhanage et al., “Virtual Basestation: Architecture for an Open Shared WiMAX Framework,” SIGCOMM ACM Special Interest Group on Data Communication, Sep. 2010, 8 pages. |
Fernandes et al., “Virtual Networks: Isolation, Performance, and Trends,” vol. 66, Issue 5-6, Annals of Telecommunications, Jun. 2011, 23 pages. |
Heiser, “VMware's MVP-Encryption Doesn't Make it Secure!” Open Kernel Labs Blog, www.ok-labs.com, Oct. 22, 2010, 2 pages. |
Gaurav et al., “Countering Code-Injection Attacks When Instruction-Set Randomization,” copyright 2003, 9 pages. |
United States Patent and Trademark Office, “Non-Final Office Action,” issued in connection with U.S. Appl. No. 13/170,845, Jun. 28, 2013, 29 pages. |
United States Patent and Trademark Office, “Final Office Action,” issued in connection with U.S Appl. No. 13/170,845, Nov. 21, 2013, 35 pages. |
United States Patent and Trademark Office, “Non-Final Office Action,” issued in connection with U.S. Appl. No. 13/170,845, Nov. 3, 2014, 28 pages. |
United States Patent and Trademark Office, “Notice of Allowance,” issued in connection with U.S. Appl. No. 13/170,845, Jun. 24, 2015, 42 pages. |
Number | Date | Country | |
---|---|---|---|
20160043998 A1 | Feb 2016 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13170845 | Jun 2011 | US |
Child | 14921881 | US |