WO2024077582A1 - Contre-mesure de sécurité pour contrôle d'admission de tranche de réseau distribué - Google Patents
Contre-mesure de sécurité pour contrôle d'admission de tranche de réseau distribué Download PDFInfo
- Publication number
- WO2024077582A1 WO2024077582A1 PCT/CN2022/125268 CN2022125268W WO2024077582A1 WO 2024077582 A1 WO2024077582 A1 WO 2024077582A1 CN 2022125268 W CN2022125268 W CN 2022125268W WO 2024077582 A1 WO2024077582 A1 WO 2024077582A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- message
- serving area
- admission
- admission control
- nssai
- Prior art date
Links
- 238000000034 method Methods 0.000 claims abstract description 136
- 230000015654 memory Effects 0.000 claims description 33
- 238000013523 data management Methods 0.000 claims description 24
- 238000007726 management method Methods 0.000 claims description 23
- 230000006870 function Effects 0.000 claims description 22
- 230000004044 response Effects 0.000 claims description 20
- 238000013507 mapping Methods 0.000 claims description 15
- 230000002159 abnormal effect Effects 0.000 claims description 5
- 238000005065 mining Methods 0.000 claims 2
- 230000006854 communication Effects 0.000 description 45
- 238000004891 communication Methods 0.000 description 45
- 230000011664 signaling Effects 0.000 description 19
- 230000001010 compromised effect Effects 0.000 description 11
- 238000012795 verification Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 238000004590 computer program Methods 0.000 description 4
- 238000010801 machine learning Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000013473 artificial intelligence Methods 0.000 description 3
- 230000003247 decreasing effect Effects 0.000 description 3
- 230000001960 triggered effect Effects 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 2
- 238000012517 data analytics Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 230000010267 cellular communication Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000001356 surgical procedure Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0289—Congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/08—Load balancing or load distribution
- H04W28/084—Load balancing or load distribution among network function virtualisation [NFV] entities; among edge computing entities, e.g. multi-access edge computing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0284—Traffic management, e.g. flow control or congestion control detecting congestion or overload during communication
Definitions
- Various example embodiments of the present disclosure generally relate to the field of telecommunication and in particular, to methods, devices, apparatuses and computer readable storage medium for security countermeasure for distributed network slice admission control (NSAC) .
- NSAC distributed network slice admission control
- the third generation partnership project (3GPP) 5th generation (5G) technology is the next generation of radio systems and network architecture that can deliver extreme broadband, ultra-robust and low latency connectivity.
- the 5G technology improves a variety of telecommunication services offered to the end users and helps to support massive broadband that delivers gigabytes of bandwidth per second on demand for both the uplink and downlink transmissions.
- network slicing is a concept for running multiple logical networks as virtually independent business operations on a common physical infrastructure.
- a slice may be identified by single network slice selection assistance information (S-NSSAI) .
- S-NSSAI single network slice selection assistance information
- the NSAC procedure is needed for the slice network. That is, the number of user equipments (UEs) or packet data unit (PDU) sessions is controlled by using a pre-configured maximum number of UEs or PDU sessions. However, if the number of UEs or PDU sessions is faked or incorrect, then the performance of the slice network would be decreased thereby.
- a first device comprises at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the first device at least to perform: receiving, from a second device, a first message for updating or reporting an admission number of UEs or PDU sessions associated with a serving area corresponding to the second device, the admission number being specific to a slice or S-NSSAI; and determining, a first number of UEs or PDU sessions specific to the slice or the S-NSSAI counted by at least one third device, such that the admission number is verified with the first number; and performing an admission control procedure based at least in part on the first number.
- a third device comprises at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the third device at least to perform: receiving, from a first device, a second message for requesting a second number of UEs or PDU sessions associated with a serving area corresponding to a second device, the second number being counted by the third device and being specific to a slice or S-NSSAI; generating a third message indicating the second number; and transmitting the third message to the second device.
- a fourth device comprises at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the fourth device at least to perform: receiving, from user equipment, a registration request; and in response to a complete of registration for the user equipment, transmitting, to a third device, a fifth message comprising information on one or more allowed S-NSSAI.
- a fifth device comprises at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the fifth device at least to perform: receiving a fourth message from a first device, the fourth message indicating that an anomaly has occurred at a second device or a serving area where the second device is located, the second device being a distributed admission control device; and triggering a security procedure to handle the anomaly.
- a sixth device comprises at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the sixth device at least to perform: collecting, from a plurality of devices, information associated with a plurality of numbers of user equipment or PDU sessions specific to a slice or S-NSSAI; and determining, based at least in part on the information, an operation status of a second device being a distributed admission control device.
- a method comprises: at a first device, receiving, from a second device, a first message for updating or reporting an admission number of UEs or PDU sessions associated with a serving area corresponding to the second device, the admission number being specific to a slice or S-NSSAI; and determining, a first number of UEs or PDU sessions specific to the slice or the S-NSSAI counted by at least one third device, such that the admission number is verified with the first number; and performing an admission control procedure based at least in part on the first number.
- a method comprises: receiving, at a third device and from a first device, a second message for requesting a second number of UEs or PDU sessions associated with a serving area corresponding to a second device, the second number being counted by the third device and being specific to a slice or S-NSSAI; generating a third message indicating the second number; and transmitting the third message to the second device.
- a method comprises: receiving, at a fourth device, from user equipment, a registration request; and in response to a complete of registration for the user equipment, transmitting, to a third device, a fifth message comprising information on one or more allowed S-NSSAI.
- a method comprises: at a fifth device, receiving a fourth message from a first device, the fourth message indicating that an anomaly has occurred at a second device or a serving area where the second device is located, the second device being a distributed admission control device; and triggering a security procedure to handle the anomaly.
- a method comprises: collecting, at a sixth device and from a plurality of devices, information associated with a plurality of numbers of user equipments or PDU sessions specific to a slice or S-NSSAI; and determining, based at least in part on the information, an operation status of a second device being a distributed admission control device.
- the first apparatus comprises means for receiving, from a second apparatus, a first message for updating or reporting an admission number of UEs or PDU sessions associated with a serving area corresponding to the second apparatus, the admission number being specific to a slice or S-NSSAI; and means for determining, a first number of UEs or PDU sessions specific to the slice or the S-NSSAI counted by at least one third apparatus, such that the admission number is verified with the first number; and means for performing an admission control procedure based at least in part on the first number.
- a third apparatus comprises means for receiving, from a first apparatus, a second message for requesting a second number of UEs or PDU sessions associated with a serving area corresponding to a second apparatus, the second number being counted by the third apparatus and being specific to a slice or S-NSSAI; means for generating a third message indicating the second number; and means for transmitting the third message to the second apparatus.
- a fourth apparatus comprises means for receiving, from user equipment, a registration request; and means for in response to a complete of registration for the user equipment, transmitting, to a third apparatus, a fifth message comprising information on one or more allowed S-NSSAI.
- a fifth apparatus comprises means for receiving a fourth message from a first apparatus, the fourth message indicating that an anomaly has occurred at a second apparatus or a serving area where the second apparatus is located, the second apparatus being a distributed admission control apparatus; and means for triggering a security procedure to handle the anomaly.
- the sixth apparatus comprises means for collecting, from a plurality of apparatuses, information associated with a plurality of numbers of user equipment or PDU sessions specific to a slice or S-NSSAI; and means for determining, based at least in part on the information, an operation status of a second apparatus being a distributed admission control apparatus.
- a computer readable medium comprises instructions stored thereon for causing an apparatus to perform at least the method according to the sixth aspect.
- a computer readable medium comprises instructions stored thereon for causing an apparatus to perform at least the method according to the seventh aspect.
- a computer readable medium comprises instructions stored thereon for causing an apparatus to perform at least the method according to the eighth aspect.
- a computer readable medium comprises instructions stored thereon for causing an apparatus to perform at least the method according to the ninth aspect.
- a computer readable medium comprises instructions stored thereon for causing an apparatus to perform at least the method according to the tenth aspect.
- FIG. 1 illustrates an example communication environment in which example embodiments of the present disclosure can be implemented
- FIG. 2A illustrates a hierarchical NSACF architecture according to some example embodiments
- FIG. 2B illustrates a signaling chart for NSAC check of the maximum number of UEs according to some example embodiments
- FIG. 2C illustrates a signaling chart for NSAC check of the maximum number of PDU sessions according to some example embodiments
- FIG. 2D illustrates a signaling chart for redistribution of local maximum number according to some example embodiments
- FIG. 3 illustrates a signaling chart for communication according to some example embodiments of the present disclosure
- FIG. 4 illustrates another signaling chart for communication according to some example embodiments of the present disclosure
- FIG. 5 illustrates a flowchart of a method implemented at a first device according to some example embodiments of the present disclosure
- FIG. 6 illustrates a flowchart of a method implemented at a third device according to some example embodiments of the present disclosure
- FIG. 7 illustrates a flowchart of a method implemented at a fourth device according to some example embodiments of the present disclosure
- FIG. 8 illustrates a flowchart of a method implemented at a fifth device according to some example embodiments of the present disclosure
- FIG. 9 illustrates a flowchart of a method implemented at a sixth device according to some example embodiments of the present disclosure.
- FIG. 10 illustrates a simplified block diagram of a device that is suitable for implementing example embodiments of the present disclosure.
- FIG. 11 illustrates a block diagram of an example computer readable medium in accordance with some example embodiments of the present disclosure.
- references in the present disclosure to “one embodiment, ” “an embodiment, ” “an example embodiment, ” and the like indicate that the embodiment described may include a particular feature, structure, or characteristic, but it is not necessary that every embodiment includes the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to affect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
- first, ” “second” and the like may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and similarly, a second element could be termed a first element, without departing from the scope of example embodiments.
- the term “and/or” includes any and all combinations of one or more of the listed terms.
- performing a step “in response to A” does not indicate that the step is performed immediately after “A” occurs and one or more intervening steps may be included.
- circuitry may refer to one or more or all of the following:
- circuitry also covers an implementation of merely a hardware circuit or processor (or multiple processors) or portion of a hardware circuit or processor and its (or their) accompanying software and/or firmware.
- circuitry also covers, for example and if applicable to the particular claim element, a baseband integrated circuit or processor integrated circuit for a mobile device or a similar integrated circuit in server, a cellular network device, or other computing or network device.
- the term “communication network” refers to a network following any suitable communication standards, such as New Radio (NR) , Long Term Evolution (LTE) , LTE-Advanced (LTE-A) , Wideband Code Division Multiple Access (WCDMA) , High-Speed Packet Access (HSPA) , Narrow Band Internet of Things (NB-IoT) and so on.
- NR New Radio
- LTE Long Term Evolution
- LTE-A LTE-Advanced
- WCDMA Wideband Code Division Multiple Access
- HSPA High-Speed Packet Access
- NB-IoT Narrow Band Internet of Things
- the communications between a terminal device and a network device in the communication network may be performed according to any suitable generation communication protocols, including, but not limited to, the first generation (1G) , the second generation (2G) , 2.5G, 2.75G, the third generation (3G) , the fourth generation (4G) , 4.5G, the fifth generation (5G) communication protocols, and/or any other protocols either currently known or to be developed in the future.
- suitable generation communication protocols including, but not limited to, the first generation (1G) , the second generation (2G) , 2.5G, 2.75G, the third generation (3G) , the fourth generation (4G) , 4.5G, the fifth generation (5G) communication protocols, and/or any other protocols either currently known or to be developed in the future.
- Embodiments of the present disclosure may be applied in various communication systems. Given the rapid development in communications, there will of course also be future type communication technologies and systems with which the present disclosure may be embodied. It should not be seen as limiting the scope of the present disclosure to only the aforementioned system
- the term “network device” refers to a node in a communication network via which a terminal device accesses the network and receives services therefrom.
- the network device may refer to a base station (BS) or an access point (AP) , for example, a node B (NodeB or NB) , an evolved NodeB (eNodeB or eNB) , an NR NB (also referred to as a gNB) , a Remote Radio Unit (RRU) , a radio header (RH) , a remote radio head (RRH) , a relay, an Integrated Access and Backhaul (IAB) node, a low power node such as a femto, a pico, a non-terrestrial network (NTN) or non-ground network device such as a satellite network device, a low earth orbit (LEO) satellite and a geosynchronous earth orbit (GEO) satellite, an aircraft network device, and so forth, depending on the applied terminology and technology
- radio access network (RAN) split architecture comprises a Centralized Unit (CU) and a Distributed Unit (DU) at an IAB donor node.
- An IAB node comprises a Mobile Terminal (IAB-MT) part that behaves like a UE toward the parent node, and a DU part of an IAB node behaves like a base station toward the next-hop IAB node.
- IAB-MT Mobile Terminal
- terminal device refers to any end device that may be capable of wireless communication.
- a terminal device may also be referred to as a communication device, user equipment (UE) , a Subscriber Station (SS) , a Portable Subscriber Station, a Mobile Station (MS) , or an Access Terminal (AT) .
- UE user equipment
- SS Subscriber Station
- MS Mobile Station
- AT Access Terminal
- the terminal device may include, but not limited to, a mobile phone, a cellular phone, a smart phone, voice over IP (VoIP) phones, wireless local loop phones, a tablet, a wearable terminal device, a personal digital assistant (PDA) , portable computers, desktop computer, image capture terminal devices such as digital cameras, gaming terminal devices, music storage and playback appliances, vehicle-mounted wireless terminal devices, wireless endpoints, mobile stations, laptop-embedded equipment (LEE) , laptop-mounted equipment (LME) , USB dongles, smart devices, wireless customer-premises equipment (CPE) , an Internet of Things (loT) device, a watch or other wearable, a head-mounted display (HMD) , a vehicle, a drone, a medical device and applications (e.g., remote surgery) , an industrial device and applications (e.g., a robot and/or other wireless devices operating in an industrial and/or an automated processing chain contexts) , a consumer electronics device, a device operating on commercial and/
- the terminal device may also correspond to a Mobile Termination (MT) part of an IAB node (e.g., a relay node) .
- MT Mobile Termination
- IAB node e.g., a relay node
- the terms “terminal device” , “communication device” , “terminal” , “user equipment” and “UE” may be used interchangeably.
- resource may refer to any resource for performing a communication, for example, a communication between a terminal device and a network device, such as a resource in time domain, a resource in frequency domain, a resource in space domain, a resource in code domain, or any other resource enabling a communication, and the like.
- a resource in both frequency domain and time domain will be used as an example of a transmission resource for describing some example embodiments of the present disclosure. It is noted that example embodiments of the present disclosure are equally applicable to other resources in other domains.
- the term “primary admission control device” refers to any entity/function/device/apparatus that is responsible for the admission control for at least one slice with the global maximum number value valid across service areas .
- the primary admission control device is located in a central area of the 5G core network/home public land mobile network (HPLMN) .
- the primary admission control device may be a primary NSACF.
- primary admission control device primary NSACF
- centralized NSACF central NSACF
- the term “distributed admission control device” refers to any entity/function/device/apparatus that is responsible for the admission control for a serving area (or visited public land mobile network, VPLMN) .
- the distributed admission control device is located at an edge of the network (such as, HPLMN or VPLMN) and may communicate with a primary admission control device.
- the distributed admission control device may be a distributed NSACF.
- distributed admission control device distributed admission control device
- local admission control device distributed NSACF
- local NSACF distributed NSACF
- control device refers to any entity/function/device/apparatus for control.
- the control device is a control plane component/device and used for controlling for a data plane, such as, a PDU session and so on.
- sessions (such as, PDU session) and so on.
- control device may be an access and mobility management function (AMF) or session management function (SMF) .
- AMF access and mobility management function
- SMF session management function
- the term “user data management device” refers to any entity/function/device/apparatus that is responsible for maintaining the user data in the network.
- the user data management device may be located in a central area of the 5G core network/HPLMN. Further, in some example embodiments, the user data management device may be accessible by the primary admission control device, the control device (s) , the analytics device (s) and so on.
- the user data management device may be a user data management (UDM) .
- management device refers to any entity/function/device/apparatus that is responsible for operation, administration, management, maintenance and so on.
- the management device may be an operation administration and maintenance (OAM) .
- OAM operation administration and maintenance
- the term “analytics device” refers to any entity/function/device/apparatus that may collect and analyze the log, trace, report, data and other running information in the network.
- the analytics device is operated based on artificial intelligence (AI) /machine learning (ML) .
- AI artificial intelligence
- ML machine learning
- the analytics device may be a network data analytics function (NWDAF) , management data analytics service (MDAS) producer and any AI/ML network function/node.
- NSAC features with the following features: improved network control of the UE behavior and support deploying multiple NSACF. That is, there may be more than one service area associated with one S-NSSAI, for example, one PLMN is split into multiple service areas. In this event, there will be more than one NSACF handling the UE, and example scenarios include:
- Multi-NSACF deployed within one PLMN more than one service is defined within one PLMN. Further, for each service area, one NSACF or NSACF set is deployed for NSAC (including the control of the maximum number of UEs or PDU sessions) .
- the NSAC when the user equipment resides at the visited PLMN (VPLMN) , the NSAC (such as, the maximum number of PDU sessions) may be controlled by the NSACF in the VPLMN (e.g. for local break out PDU session) , or the NSACF in the HPLMN (e.g. for home-routed PDU session) .
- Evolved packet system (EPS) interworking when the user equipment establishes a home-routed PDN connection at the EPS network and move to 5G system later, the NSACF (for example, the maximum number of user equipment) selected by the SMF+ packet data network gateway control plane function (PGW-C) and AMF may be different.
- NSACF for example, the maximum number of user equipment
- a slice may be identified by S-NSSAI, and further for one slice/S-NSSAI, there is only one configured global maximum allowed number value for NSAC (i.e., a maximum number of UEs or PDU sessions) .
- NSAC a maximum number of UEs or PDU sessions
- the admission control is aimed to match the allocated quota.
- DoS denial of service
- a malicious distributed NSACF of a serving area may provide faked or false information of the number of UEs or PDU sessions.
- the security control in different serving areas/ (V) PLMNs may be different.
- the security control at the edge of the network is not as strict as that in data center, which causes that attack surface at the edge of the network may be higher than the data center.
- a compromised/malicious distributed NSACFs in some high risky serving areas/networks may trigger DoS or other attacks on the home network.
- the compromised/malicious distributed NSACFs at the edge of the network may fake the case that the number of UEs is reaching the local maximum number allocated to the serving area, and may transmit a message of Nnsacf_NSAC_NumberUpdate_Request to the primary NSACF for a new quota.
- the primary NSACF may allocate new quota to the compromised/malicious distributed NSACFs.
- the available quota for the other normal serving areas may be decreased.
- the admission service for the normal serving areas may be impacted as the global maximum number has been exhausted by the compromised/malicious distributed NSACF (s) .
- the user equipment may be still counted against quota usage of S-NSSAIs where it is registered.
- a device such as, a primary NSACF or an analytics device
- the compromised/malicious distributed NSACF (s) /AMF (s) /SMF (s) may be identified.
- FIG. 1 illustrates an example communication environment 100 in which example embodiments of the present disclosure can be implemented.
- communication environment 100 compromises a plurality of communication devices, a first device 110 and more than one second device (such as, the second devices 120-1 and 120-2) , more than one third device (such as, the third devices 130-1 and the 130-2) , one or more fifth devices (such as, the fifth device 150) and one or more sixth device (such as, the sixth device 160) .
- the first device 110 operating as a primary admission control device (such as, primary NSACF)
- the second device 120 operating as a distributed admission control device (such as, distributed NSACF, which may be implemented as one NSACF instance or one NSACF set)
- the third device 130 operating as a user data management device (such as, UDM)
- the fifth device 150 operating as a management device (such as, OAM)
- the sixth device 160 operating as an analytics device (such as, NWDAF or MDAS producer) .
- each second device 120 corresponds to a serving area/VPLMN.
- each serving area/VPLMN may comprise a plurality of fourth devices 140 to control the signalling, PDU session and so on.
- the fourth devices 140-1 and 140-2 are connected to the second device 120-1, and the fourth devices 140-3 and 140-4 are connected to the second device 120-2.
- the fourth device 140 may be either an AMF or SMF.
- the fourth devices 140-1 and 140-3 may be AMFs
- the fourth devices 140-2 and 140-4 may be SMFs.
- each slice may be identified by respective S-NSSAI.
- a global maximum allowed number value (i.e., a maximum number of UEs and PDU sessions) is configured for NSAC.
- the first device 110 performs the NSAC for each slice/S-NSSAI based on the global maximum allowed number value, and allocates corresponding quotas to the serving areas.
- a hierarchical NSACF architecture is supported in the communication environment 100.
- one NSACF acting as primary NSACF is introduced, such as the first device 110 in FIG. 1.
- Each of the other NSACFs (such as the second device 120 in FIG. 1) serves one service area.
- the Primary NSACF enables a centralized management of the global maximum allowed number value.
- the service level agreement (SLA) attribute i.e., the global maximum number value valid across service areas
- SLA service level agreement
- FIG. 2A illustrates a hierarchical NSACF architecture 200 according to some example embodiments.
- a distributed NSACF is deployed on a service area basis, which may be one NSACF instance or one NSACF Set. Further, each distributed NSACF performs maximum number of registered user equipment or established PDU sessions control independently. In this event, a UE registration or PDU session establishment may be rejected by the network due to the local maximum number of UE/PDU session is reached at the current serving NSACF even the maximum number may still be available at other NSACFs.
- FIG. 2B illustrates a signaling chart 220 for NSAC check of the maximum number of UEs according to some example embodiments
- FIG. 2C illustrates a signaling chart 240 for NSAC check of the maximum number of PDU sessions according to some example embodiments
- FIG. 2D illustrates a signaling chart 260 for redistribution of local maximum number according to some example embodiments.
- the communication environment 100 may include any suitable number of devices configured to implementing example embodiments of the present disclosure.
- Communications in the communication environment 100 may be implemented according to any proper communication protocol (s) , comprising, but not limited to, cellular communication protocols of the first generation (1G) , the second generation (2G) , the third generation (3G) , the fourth generation (4G) , the fifth generation (5G) , the sixth generation (6G) , and the like, wireless local network communication protocols such as Institute for Electrical and Electronics Engineers (IEEE) 802.11 and the like, and/or any other protocols currently known or to be developed in the future.
- s cellular communication protocols of the first generation (1G) , the second generation (2G) , the third generation (3G) , the fourth generation (4G) , the fifth generation (5G) , the sixth generation (6G) , and the like
- wireless local network communication protocols such as Institute for Electrical and Electronics Engineers (IEEE) 802.11 and the like, and/or any other protocols currently known or to be developed in the future.
- the communication may utilize any proper wireless communication technology, comprising but not limited to: Code Division Multiple Access (CDMA) , Frequency Division Multiple Access (FDMA) , Time Division Multiple Access (TDMA) , Frequency Division Duplex (FDD) , Time Division Duplex (TDD) , Multiple-Input Multiple-Output (MIMO) , Orthogonal Frequency Division Multiple (OFDM) , Discrete Fourier Transform spread OFDM (DFT-s-OFDM) and/or any other technologies currently known or to be developed in the future.
- CDMA Code Division Multiple Access
- FDMA Frequency Division Multiple Access
- TDMA Time Division Multiple Access
- FDD Frequency Division Duplex
- TDD Time Division Duplex
- MIMO Multiple-Input Multiple-Output
- OFDM Orthogonal Frequency Division Multiple
- DFT-s-OFDM Discrete Fourier Transform spread OFDM
- a device such as, a primary NSACF or an analytics device may obtain information associated with more accurate number (s) of user equipment or PDU sessions specific to a slice or S-NSSAI. With such information, the compromised/malicious distributed NSACF (s) /AMF (s) /SMF (s) may be identified.
- FIG. 3 shows a signaling chart 300 for communication according to some example embodiments of the present disclosure.
- the signaling chart 300 involves a first device 110, a second device 120, third device (s) 130, fourth device (s) 140 and a fifth device 150.
- the NSAC procedure relates to at least of a number of UEs and a number of PDU sessions.
- the first device 110 is described as a primary admission control device
- the second device 120 is described as a distributed admission control device
- the third device 130 is described as a user data management device
- the fifth device 150 is described as a management device (such as, OAM) .
- OAM OAM
- the first device 110 to the fifth device 150 may be any suitable device type. The present disclosure is not limited in this regard.
- the second device 120 may correspond a serving area/VPLM, and may be served by one or more slices. Further, one or more fourth devices 140 (such as, AMF (s) and SMF (s) ) may be located in the serving area corresponding to the second device 120.
- AMF AMF
- SMF SMF
- one or more third devices 130 are deployed in the communication environment 100.
- Each third device 130 may be responsible for maintaining user data for one or more user groups, one or more serving areas/VPLMNs, one or more subnetworks, and so on.
- the total users/user data may be divided to be maintained by the one or more third devices 130 in any suitable manner. The present disclosure is not limited in this regard.
- At least part of the one or more third devices 130 may be accessed by the fourth device (s) 140 according to the network deployment and configuration.
- the fist device 110 and the one or more third devices 130 are located in the central area of the communication environment 100, and the first device 110 may access all of the one or more third devices 130.
- the third device 130 may provide a more accurate number of UEs or PDU sessions by interacting with the fourth device (s) 140 as discussed with reference to FIG. 3.
- the fourth device 140 transmits 305 a fifth message to the third device 130.
- the fifth message comprises information on one or more allowed S-NSSAI.
- the third device 130 may establish association (s) among the fourth device 140, the registered user equipment with the allowed S-NSSAI.
- the fourth device 140 handling the registration request may be an AMF.
- the fourth device 140 receives a registration request from the user equipment. Upon a completion of primary authentication and authorization for the user equipment, the fourth device 140 transmits a message of Nudm_UECM_Registration to the third device 130 to inform about the allowed slices list, for example, the registration message comprises one or more allowed S-NSSAI.
- a malicious AMF may fake message of Nudm_UECM_Registration.
- this kind of threat can be addressed.
- the AMF may fake the S-NSSAI to the S-NSSAI it intends to attack.
- the S-NSSAI should be part of subscribed S-NSSAIs of the user equipment in any case, it's difficult to the malicious AMF to realize DoS attack with general signaling, such as, message of Nudm_UECM_Registration without involving huge number of real user equipment.
- the third device 130 may have a capability to provide a more accurate number of (registered) user equipment.
- the third device 130 also may communicate with the fourth device 140 (such as, an SMF) to obtain a more accurate number of PDU session.
- the fourth device 140 transmits 310 a message of Nudm_UECM_Registration to the third device 130 to register the PDU session, where the message of Nudm_UECM_Registration comprises an allowed S-NSSAI.
- the third device 130 may establish association (s) among the fourth device 140, the established PDU session with the S-NSSAI.
- a malicious SMF may fake message of Nudm_UECM_Registration.
- the total number of registered user equipment cannot be faked, the number of PDU sessions for one user equipment is restricted.
- it's difficult for the malicious SMF to realize DoS attack with general signaling such as Nudm_UECM_Registration
- the third device 130 also may have a capability to provide a more accurate number of PDU sessions. Further, with the enhance features, the third device 130 may generate a report for the number of registered user equipment or PDU sessions per network slice for a specific VPLMN/serving area/AMF (s) /SMF (s) .
- an enhanced secure countermeasure for NSAC may be achieved as discussed below.
- the second device 120 transmits 310 a first message for updating one or more admission numbers of user equipment or PDU sessions to the first device 110.
- the second device 120 transmits 310 a first message for reporting one or more admission numbers of user equipment or PDU sessions to the first device 110.
- each admission number is associated with the serving area/VPLMN corresponding to the second device 130 and is specific to a specific S-NSSAI.
- transmitting the first message is triggered by one or more specific events.
- One example event is the number of UEs or PDU sessions is reaching/have been reached the maximum admission number allocated to the corresponding serving area (such as, the local maximum number of UEs or PDU sessions) .
- Another example of is the number of UEs or PDU sessions exceeds a pre-defined threshold number.
- a further event is the increasing rate of user equipment or PDU sessions exceeds a pre-defined threshold rate.
- the transmission of the first message may be triggered by any suitable event. Further, the above events and the other suitable events may be used either separately or in combination. The present disclosure is not limited in this regard.
- the first message is transmitted periodically.
- the periodicity may either be a default parameter stipulated by wireless standards (such as, 3GPP) , or be configured by a network device or the network operator.
- the admission number comprised in the first message indicates a maximum admission number allocated to the serving area.
- the first device 110 may be informed that the number of UEs or PDU sessions is reaching/has been reached the maximum admission number allocated to the serving area.
- the admission number comprised in the first message indicates a current admission number determined by the second device 120.
- the first device may understand the operation information of the serving area.
- the second device 120 (a distributed NSACF in a VPLMN or specific serving area) transmits message of Nnsacf_NSAC_NumberOfUEsUpdate_Request or Nnsacf_NSAC_NumberOfPDUsUpdate_Request to the first device 110 (a primary NSACF) , which implies that the local maximum or the pre-configured threshold number of user equipment/PDU session for triggering the reporting is reaching/has been reached.
- the admission number determined by the second device 120 may be faked or incorrect.
- the first device 110 may determine 390 a first number of UEs or PDU sessions specific to the slice or the S-NSSAI. In particular, the first number is counted by at least one third device 130.
- the number of UEs or PDU session counted by the at least one third device 130 is more accurate.
- the admission number indicated by the first message may be verified with the first number.
- the first device may perform 395 an admission control procedure based at least in part on the first number. Specifically, in some example embodiments, the first device 110 compares 355 the first number with the admission control number (such as, the local maximum number comprised in the message of Nnsacf_NSAC_NumberOfUEsUpdate_Request or Nnsacf_NSAC_NumberOfPDUsUpdate_Request) to determine whether the first number is matched with the admission control number.
- the admission control number such as, the local maximum number comprised in the message of Nnsacf_NSAC_NumberOfUEsUpdate_Request or Nnsacf_NSAC_NumberOfPDUsUpdate_Request
- the difference between the first number and the admission control number is smaller than a threshold difference, it is determined that first number is matched with the admission control number, else it is determined that first number is mismatched with the admission control number.
- the first device 110 performs 360 a NSAC procedure based at least in part on the first message.
- the second device 120 i.e., a distributed NSACF
- the first message includes the S-NSSAI, requested local maximum user equipment/PDU session number, i.e. increasing the local maximum user equipment/PDU session number/admission number. If the first number is matched with the admission control number.
- the first device 110 checks the global maximum user equipment/PDU session number and determines whether to accept or reject the requested the local maximum user equipment/PDU session number, i.e. whether the update of the local maximum user equipment/PDU session number of the second device 120 is accepted. If the first device 110 has no more available allowance, the first device 110 may indicate to the second device 120 to reject any new increase request. Else, the first device 110 may accept the requested local maximum user equipment/PDU session number.
- the first device 110 returns a response message of Nnsacf_NSAC_NumberUpdate_Response.
- the response message may include a new allocated local maximum PDU session number, or it may return indication to reject any further new user registration/PDU sessions with a cause code.
- the first device may determine that a potential anomaly of the second device 120 or the serving area is occurred.
- the first device 110 may handle such potential anomaly.
- the first device 110 may stop 365 the NSAC procedure for the first message, as the second device 120 may be a compromised/malicious device.
- the first device 110 may adjust the admission control number according to the first number, as compared with the admission control number indicated by the first message, the first number counted by the third device (s) 130 is more accurate.
- the first device 110 may transmit 370 a fourth message to a fifth device 150, where the fourth message may indicate that an anomaly has occurred at the second device 120 or in the serving area and the fifth device 150 may be a management device (such as, OAM) .
- the fifth device 150 may trigger 380 a security procedure to handle such anomaly, such as, re-deploy the second device 120 or other related network function/node.
- the fourth message may indicate at least one of the following: an identity of the second device 120 (such as, an NSACF identity) , or an identity of the serving area/VPLMN corresponding to the second device 120.
- the first device 110 may transmit 375 a response message for the first message, where the response message may indicate whether the requested update indicated by the first message is successful (accepted) or failed (rejected) .
- the first device 110 returns a response message of Nnsacf_NSAC_NumberUpdate_Response, where the response message may include a new allocated local maximum PDU session number, or it may return indication to reject any further new user registration/PDU sessions with a cause code.
- the verification operation may be configured to be performed conditionally.
- the first device 110 may determine whether it is needed to verify the admission number according to a pre-configured policy.
- the pre-configured policy may be associated with a plurality of factors.
- One example factor is a threat surface of the second device 120.
- Another example factor is the S-NSSAI.
- a further example is an identity of PLMN corresponding to the first device 110.
- the other example factors include but are not limited to, an identity of VPLMN corresponding to the second device 120, a pre-configured threshold number of UEs or PDU sessions, and a security control policy of the serving area.
- the verification may be triggered based on a pre-configured threshold configuration for each second device 120 (i.e., the serving area) . For example, if the number of UEs or PDU session exceeds the pre-configured threshold but does not reach the maximum value, the first device 110 may trigger to verify the admission number. Similarly, when the number of UEs or PDU session drops below a further threshold number, the first device 110 also may trigger to verify the admission number.
- the pre-configured policy may be associated with any suitable factors. Further, the above factors and the other suitable factors may be used either separately or in combination. The present disclosure is not limited in this regard.
- the verification procedure may be skipped.
- the first device 110 performs the NSAC procedure based at least in part on the first message as discussed above. In this way, whether to verify the admission number may be performed more flexible. For example, the verification procedure is only performed on the high-risk serving area, or the verification procedure is performed only in case that the reported admission number is higher than a pre-defined threshold value.
- the fourth device (s) 140 located in the serving area may access more than one third device 130 during the procedure of UE registration and PDU session establishment, the first device 110 thus needs to communicate with more than one third device 130 to obtain the first number.
- the first device 110 transmits 335 a second message to each related third device 130.
- the second message is used for requesting a second number of UEs or PDU sessions associated with the serving area and is specific to the slice or the S-NSSAI.
- the first device 110 determines 330 the related third device (s) 130 first. In some example embodiments, the first device 110 determines the related third device (s) 130 by scanning all accessible third devices 130. Alternatively, in some other embodiments, the first device 110 determines the related third device (s) 130 by performing a discovery procedure of third device 130 according to a pre-configured rule. Further, the pre-configured rule may be stored locally or in the network repository function (NRF) .
- NRF network repository function
- the NRF discovery service in order to contact the related third device (s) 130, is enhanced to return individual instances of the third device 130 that hold all the subscribers. For example, if the third device 130-1 is configured to support the subscribers in the first area, and the third device 130-2 is configured to support the subscribers in the second area, the NRF would return both the third devices 130-1 and the third device 130-2. Alternatively, the NRF may return all the instances of the third device 130 and the first device 110 may determine the groups of the third device 130 based on network function profile of the third device 130.
- the second message may comprise parameters indicating the requirement associated with the second number.
- One example parameter is the S-NSSAI.
- Another example parameter is an identity of the serving area or an identity of VPLMN associated with the second device 120.
- a further parameter is at least one identity of at least one fourth device 140 being located in the serving area, such as, a list of AMF/SMF identities.
- the first device 110 may request each of the related third device 130 to obtain the number of UEs registered in a specific VPLMN or AMFs/SMFs of HPLMN for the specific slice/S-NSSAI, or the number of PDU sessions established in a specific VPLMN or AMFs/SMFs of HPLMN for the specific slice/S-NSSAI.
- the first device 110 may determine 325 the at least one identity of the at least one fourth device 140 in the serving area first. In some example embodiments, the first device 110 determines the at least one identity of the at least one fourth device according to a first mapping of the second device 120 and the at least fourth device 140. Alternatively, in some example embodiments, the first device 110 determines the at least one identity of the at least one fourth device according to a second mapping of the serving area and the at least fourth device 140.
- the first/second mapping is pre-configured at the first device 110.
- the fourth devices 140 update the user equipment/PDU session count to the second device 120, and the second device 120 communicates information on the fourth device 140 to the first device 110.
- the third device 130 has a capability to provide a more accurate number of UEs or PDU session. Further, the third device 130 also has established association (s) among the fourth device 140, the registered user equipment, the allowed S-NSSAI and/or the established PDU session. Thus, after receiving the second message, the third device may generate 340 a third message indicating the requested second number.
- the second number may be reported at any suitable granularity.
- the second number is specific to the second device 120.
- the second number is specific to the serving area.
- the second number is specific to at least one fourth device 140 being located in the serving area.
- the second number may be counted flexibly, and the present disclosure is not limited in this regard.
- the third device 130 transmits 345 the third message to the first device 110.
- the first device 110 may obtain the second number from each of the related third device 130.
- the first device 110 determines the first number by consolidating 350 at least one second number received from the at least one related third device 130.
- the admission number reported by the second device 120 may be verified by the first device 110.
- the compromised/malicious second device 120/fourth device 140 may be identified timely.
- an analytics device (such as, AI/ML-based network function) also may identify the anomaly of the second device 120/serving area/fourth device 140.
- FIG. 4 shows a signaling chart 400 for communication according to some example embodiments of the present disclosure.
- the signaling chart 400 involves a sixth device 160, a fifth device 150 and a plurality of devices.
- the fifth device 150 is described as a management device (such as, OAM)
- the sixth device 160 is described as an analytics device (such as, NWDAF or MDAS producer) .
- the sixth device 160 collects 410 information associated with a plurality of numbers of user equipment or PDU sessions specific to a slice or S-NSSAI from a plurality of devices.
- the plurality of devices comprise but are not limited to: a primary admission control device (such as, the first device 110 in FIG. 1) , at least one distributed admission control device (such as, the second device 120 in FIG. 1) , at least one control device (such as, the fourth device 140 in FIG. 1) , at least one user data management device (such as, the first device 130 in FIG. 1) , or at least one analytics device. That is, the sixth device 160 may collect the related information from any suitable device. The present disclosure is not limited in this regard.
- the collected information may be a number of UEs or PDU sessions determined by a respective device. Alternatively, or in addition, in some example embodiments, the collected information may be a trace (or log) recorded on a respective device. Alternatively, or in addition, in some example embodiments, the collected information may be a load or congestion information/report generated by a respective device. That is, the collected information may be represented as any suitable forms. The present disclosure is not limited in this regard.
- the sixth device 160 may determines 420 an operation status of a second device 120 (i.e., a distributed admission control device) .
- the sixth device 160 may determine the admission number, the second number and/or the first number. Then the sixth device 160 may determine the operation status accordingly as discussed above.
- the sixth device 160 also may transmit 430 a fourth message to the fifth device (or the first device 110, not shown in FIG. 4) , where the fourth message indicates that an anomaly has occurred at the second device 120 or in the serving area.
- the NWDAF/MDAF (such as, the sixth device 160) supports new analytics of malicious NSACF detection.
- the NWDAF/MDAF of the HPLMN monitors the trends of quota for each distributed NSACF (such as, the second device 120) by collecting data from primary NSACF (such as, the first device 110) .
- the NWDAF/MDAF also may collect a more accurate number of UEs or PDU sessions counted by the UDMs and/or additional data (e.g. information/log/trace from AMF (s) /SMF (s) , load information of the slice, congestion report of the slice and so on) . Then, the NWDAF/MDAF compares the quota with a more accurate number of UEs or PDU sessions. If the malicious/compromised distributed NSACF is detected, the NWDAF/MDAF may generate an analytics report (such as, the fourth message) to alarm/report the potential malicious/compromised distributed NSACF.
- additional data e.g. information/log/trace from AMF (s) /SMF (s) , load information of the slice, congestion report of the slice and so on. Then, the NWDAF/MDAF compares the quota with a more accurate number of UEs or PDU sessions. If the malicious/compromised distributed NSACF is detected, the NWDA
- the NWDAF/MDAF also may trigger to reduce the quota for the distributed NSACF, or trigger to re-deploy the distributed NSACF and other network functions in the same serving area or VPLMN.
- the anomaly of the second device 120 or the serving area may be identified and handled timely.
- FIG. 5 shows a flowchart of an example method 500 implemented at a first device 110 in accordance with some example embodiments of the present disclosure. For the purpose of discussion, the method 500 will be described from the perspective of the first device 110 in FIG. 1.
- the first device 110 receives, from a second device 120, a first message for updating or reporting an admission number of UEs or PDU sessions associated with a serving area corresponding to the second device 120, the admission number being specific to a slice or S-NSSAI.
- the first device 110 determines, a first number of UEs or PDU sessions specific to the slice or the S-NSSAI counted by at least one third device 130, such that the admission number is verified with the first number.
- the first device 110 performs an admission control procedure based at least in part on the first number.
- the admission number indicates one of the following: a maximum admission number allocated to the serving area, or a current admission number determined by the second device 120.
- a pre-configured policy associated with at least one of the following: a threat surface of the second device 120, the S-NSSAI, an identity of PLMN corresponding to the first device 110, the serving area, an identity of VPLMN corresponding to the second device 120, or a security control policy of the serving area.
- determining the first number comprises: transmitting, to each of the at least one third device 130, a second message for requesting a second number of UEs or PDU sessions associated with the serving area, the second number being counted by a respective third device 130 of the at least one third device 130 and being specific to the slice or the S-NSSAI; receiving, from each of the at least one third device 130, a third message indicating the second number; and determining the first number by consolidating at least one second number received from the at least one third device 130.
- the second message comprises at least one of the following: the S-NSSAI, an identity of the serving area, an identity of visited PLMN (VPLMN) associated with the second device 120, or at least one identity of at least one fourth device 140 being located in the serving area, each of the at least one fourth device 140 being a control device.
- the S-NSSAI an identity of the serving area
- VPN visited PLMN
- the first device 110 determines the at least one identity of the at least one fourth device 140 according to a mapping of one of the following: a first mapping of the second device 120 and the at least fourth device 140, or a second mapping of the serving area and the at least fourth device 140.
- the second number is specific to one of the following: the second device 120, the serving area, or at least one fourth device 140 being located in the serving area, each of the at least one fourth device 140 being a control device.
- the first device 110 determines the at least one third device 130 by one of the following: scanning all accessible third device 130, or performing a discovery procedure of third device 130 according to a pre-configured rule.
- performing the admission control procedure based at least in part on the first number comprises: comparing the first number with the admission control number; if the first number is matched with the admission control number, performing, based at least in part on the first message, an NSAC procedure; and if the first number is mismatched with the admission control number, performing at least one of the following: stopping the NSAC procedure; adjusting the admission control number according to the first number; or transmitting a fourth message to a fifth device 150, the fourth message indicating that an anomaly has occurred at the second device 120 or in the serving area.
- the fifth device 150 is a management device.
- the first device 110 is a primary admission control device
- the second device 120 is a distributed admission control device
- the third device 130 a user data management device.
- FIG. 6 shows a flowchart of an example method 600 implemented at a third device 120 in accordance with some example embodiments of the present disclosure. For the purpose of discussion, the method 600 will be described from the perspective of the third device 130 in FIG. 1.
- the third device 130 receives, from a first device 110, a second message for requesting a second number of UEs or PDU sessions associated with a serving area corresponding to a second device 120, the second number being counted by the third device 130 and being specific to a slice or S-NSSAI.
- the third device 130 generates a third message indicating the second number.
- the third device 130 transmits the third message to the second device 120.
- the second message comprises at least one of the following: the-NSSAI, an identity of the serving area, an identity of VPLMN associated with the second device 120, or at least one identity of at least one fourth device 140 being located in the serving area, each of the at least one fourth device 140 being a control device.
- the second number is specific to one of the following: the second device 120, the serving area, at least one fourth device 140 being located in the serving area, each of the at least one fourth device 140 being a control device.
- the first device 110 is a primary admission control device or an analytics device
- the second device 120 is a distributed admission control device
- the third device 130 a user data management device.
- FIG. 7 shows a flowchart of an example method 700 implemented at a fourth device 140 in accordance with some example embodiments of the present disclosure. For the purpose of discussion, the method 700 will be described from the perspective of the fourth device 140 in FIG. 1.
- the fourth device 140 receives from user equipment, a registration request.
- the fourth device 140 transmits, to a third device 130, a fifth message comprising information on one or more allowed S-NSSAI.
- the fourth device 140 is an AMF
- the third device 130 is a user data management device.
- FIG. 8 shows a flowchart of an example method 800 implemented at a fifth device 150 in accordance with some example embodiments of the present disclosure. For the purpose of discussion, the method 800 will be described from the perspective of the fifth device 150 in FIG. 1.
- the fifth device 150 receives a fourth message from a first device 110, the fourth message indicating that an anomaly has occurred at a second device 120 or a serving area where the second device 120 is located, the second device 120 being a distributed admission control device.
- the fifth device 150 triggers a security procedure to handle the anomaly.
- the first device 110 is a primary admission control device or an analytics device
- the fifth device 150 is a management device.
- FIG. 9 shows a flowchart of an example method 900 implemented at a sixth device 160 in accordance with some example embodiments of the present disclosure. For the purpose of discussion, the method 900 will be described from the perspective of the sixth device 160 in FIG. 1.
- the sixth device 160 collects, from a plurality of devices, information associated with a plurality of numbers of user equipment or PDU sessions specific to a slice or S-NSSAI.
- the sixth device 160 determines, based at least in part on the information, an operation status of a second device 120 being a distributed admission control device.
- the information associated with the plurality of numbers comprises at least one of the following: a number of UEs or PDU sessions determined by a respective device of the plurality devices, a trace recorded on a respective device of the plurality devices, or a load or congestion information report generated by a respective device of the plurality devices.
- the sixth device 160 is an analytics device, and the plurality of devices comprises at least one of the following: a primary admission control device, at least one distributed admission control device, at least one control device, at least one user data management device, or at least one analytics device.
- a first apparatus capable of performing any of the method 500 may comprise means for performing the respective operations of the method 500.
- the means may be implemented in any suitable form.
- the means may be implemented in a circuitry or software module.
- the first apparatus may be implemented as or included in the first device 110 in FIG. 1.
- the first apparatus comprises means for receiving, from a second apparatus, a first message for updating or reporting an admission number of UEs or PDU sessions associated with a serving area corresponding to the second apparatus, the admission number being specific to a slice or S-NSSAI; and means for determining, a first number of UEs or PDU sessions specific to the slice or the S-NSSAI counted by at least one third apparatus, such that the admission number is verified with the first number; and means for performing an admission control procedure based at least in part on the first number.
- the admission number indicates one of the following: a maximum admission number allocated to the serving area, or a current admission number determined by the second apparatus.
- means for determining the first number comprises: means for transmitting, to each of the at least one third apparatus, a second message for requesting a second number of UEs or PDU sessions associated with the serving area, the second number being counted by a respective third apparatus of the at least one third apparatus and being specific to the slice or the S-NSSAI; means for receiving, from each of the at least one third apparatus, a third message indicating the second number; and means for determining the first number by consolidating at least one second number received from the at least one third apparatus.
- the second message comprises at least one of the following: the S-NSSAI, an identity of the serving area, an identity of VPLMN associated with the second apparatus, or at least one identity of at least one fourth apparatus being located in the serving area, each of the at least one fourth apparatus being a control apparatus.
- the second number is specific to one of the following: the second apparatus, the serving area, or at least one fourth apparatus being located in the serving area, each of the at least one fourth apparatus being a control apparatus.
- means for performing the admission control procedure based at least in part on the first number comprises: means for comparing the first number with the admission control number; means for if the first number is matched with the admission control number, performing, based at least in part on the first message, an NSAC procedure; and means for if the first number is mismatched with the admission control number, performing at least one of the following: means for stopping the NSAC procedure; means for adjusting the admission control number according to the first number; or means for transmitting a fourth message to a fifth apparatus, the fourth message indicating that an anomaly has occurred at the second apparatus or in the serving area.
- the fifth apparatus is a management apparatus.
- the first apparatus is a primary admission control apparatus
- the second apparatus is a distributed admission control apparatus
- the third apparatus a user data management apparatus.
- the first apparatus further comprises means for performing other operations in some example embodiments of the method 500 or the first device 110.
- the means comprises at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the performance of the first apparatus.
- a third apparatus capable of performing any of the method 600 may comprise means for performing the respective operations of the method 600.
- the means may be implemented in any suitable form.
- the means may be implemented in a circuitry or software module.
- the third apparatus may be implemented as or included in the third device 130 in FIG. 1.
- the third apparatus comprises means for receiving, from a first apparatus, a second message for requesting a second number of UEs or PDU sessions associated with a serving area corresponding to a second apparatus, the second number being counted by the third apparatus and being specific to a slice or S-NSSAI; means for generating a third message indicating the second number; and means for transmitting the third message to the second apparatus.
- the second message comprises at least one of the following: the-NSSAI, an identity of the serving area, an identity of VPLMN associated with the second apparatus, or at least one identity of at least one fourth apparatus being located in the serving area, each of the at least one fourth apparatus being a control apparatus.
- the second number is specific to one of the following: the second apparatus, the serving area, at least one fourth apparatus being located in the serving area, each of the at least one fourth apparatus being a control apparatus.
- the third apparatus further comprises: means for receiving, from a fourth apparatus, a fifth message comprising information on one or more allowed S-NSSAI, the fifth message being transmitted by the fourth apparatus in response to a complete of registration for user equipment, the fourth apparatus being an AMF.
- the first apparatus is a primary admission control apparatus or an analytics apparatus
- the second apparatus is a distributed admission control apparatus
- the third apparatus a user data management apparatus.
- the third apparatus further comprises means for performing other operations in some example embodiments of the method 600 or the third device 130.
- the means comprises at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the performance of the third apparatus.
- a fourth apparatus capable of performing any of the method 700 may comprise means for performing the respective operations of the method 700.
- the means may be implemented in any suitable form.
- the means may be implemented in a circuitry or software module.
- the fourth apparatus may be implemented as or included in the fourth device 140 in FIG. 1.
- the fourth apparatus comprises means for receiving, from user equipment, a registration request; and means for in response to a complete of registration for the user equipment, transmitting, to a third apparatus, a fifth message comprising information on one or more allowed S-NSSAI.
- the fourth apparatus is an AMF
- the third apparatus is a user data management apparatus.
- the fourth apparatus further comprises means for performing other operations in some example embodiments of the method 700 or the fourth device 140.
- the means comprises at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the performance of the third apparatus.
- a fifth apparatus capable of performing any of the method 800 may comprise means for performing the respective operations of the method 800.
- the means may be implemented in any suitable form.
- the means may be implemented in a circuitry or software module.
- the fifth apparatus may be implemented as or included in the fifth device 150 in FIG. 1.
- the fifth apparatus comprises means for receiving a fourth message from a first apparatus, the fourth message indicating that an anomaly has occurred at a second apparatus or a serving area where the second apparatus is located, the second apparatus being a distributed admission control apparatus; and means for triggering a security procedure to handle the anomaly.
- the first apparatus is a primary admission control apparatus or an analytics apparatus
- the fifth apparatus is a management apparatus.
- the fifth apparatus further comprises means for performing other operations in some example embodiments of the method 800 or the fifth device 150.
- the means comprises at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the performance of the fourth apparatus.
- a sixth apparatus capable of performing any of the method 900 may comprise means for performing the respective operations of the method 900.
- the means may be implemented in any suitable form.
- the means may be implemented in a circuitry or software module.
- the sixth apparatus may be implemented as or included in the sixth device 160 in FIG. 1.
- the sixth apparatus comprises means for collecting, from a plurality apparatus, information associated with a plurality of numbers of user equipment or PDU sessions specific to a slice or S-NSSAI; and means for determining, based at least in part on the information, an operation status of a second apparatus being a distributed admission control apparatus.
- the information associated with the plurality of numbers comprises at least one of the following: a number of UEs or PDU sessions determined by a respective apparatus of the plurality of apparatuses, a trace recorded on a respective apparatus of the plurality of apparatuses, or a load or congestion information report generated by a respective apparatus of the plurality of apparatuses.
- the sixth apparatus further comprises: means for if the operation status is determined to be abnormal, transmitting a fourth message to a fifth apparatus, the fourth message indicating that an anomaly has occurred at the second apparatus or in the serving area.
- the sixth apparatus is an analytics apparatus
- the plurality of apparatuses comprises at least one of the following: a primary admission control apparatus, at least one distributed admission control apparatus, at least one control apparatus, at least one user data management apparatus, or at least one analytics apparatus.
- the sixth apparatus further comprises: means for performing other operations in some example embodiments of the method 900 or the sixth apparatus 160.
- the means comprises at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the performance of the fifth apparatus.
- FIG. 10 is a simplified block diagram of a device 1000 that is suitable for implementing example embodiments of the present disclosure.
- the device 1000 may be provided to implement a communication device, for example, the first device 110, the third device 130, the fourth device 140, the fifth device 150 or the sixth device 160 as shown in FIG. 1.
- the device 1000 includes one or more processors 1010, one or more memories 1020 coupled to the processor 1010, and one or more communication modules 1040 coupled to the processor 1010.
- the communication module 1040 is for bidirectional communications.
- the communication module 1040 has one or more communication interfaces to facilitate communication with one or more other modules or devices.
- the communication interfaces may represent any interface that is necessary for communication with other network elements.
- the communication module 1040 may include at least one antenna.
- the processor 1010 may be of any type suitable to the local technical network and may include one or more of the following: general purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs) and processors based on multicore processor architecture, as non-limiting examples.
- the device 1000 may have multiple processors, such as an application specific integrated circuit chip that is slaved in time to a clock which synchronizes the main processor.
- the memory 1020 may include one or more non-volatile memories and one or more volatile memories.
- the non-volatile memories include, but are not limited to, a Read Only Memory (ROM) 1024, an electrically programmable read only memory (EPROM) , a flash memory, a hard disk, a compact disc (CD) , a digital video disk (DVD) , an optical disk, a laser disk, and other magnetic storage and/or optical storage.
- ROM Read Only Memory
- EPROM electrically programmable read only memory
- flash memory a hard disk
- CD compact disc
- DVD digital video disk
- optical disk a laser disk
- RAM random access memory
- a computer program 1030 includes computer executable instructions that are executed by the associated processor 1010.
- the instructions of the program 1030 may include instructions for performing operations/acts of some example embodiments of the present disclosure.
- the program 1030 may be stored in the memory, e.g., the ROM 1024.
- the processor 1010 may perform any suitable actions and processing by loading the program 1030 into the RAM 1022.
- the example embodiments of the present disclosure may be implemented by means of the program 1030 so that the device 1000 may perform any process of the disclosure as discussed with reference to FIG. 3 to FIG. 9.
- the example embodiments of the present disclosure may also be implemented by hardware or by a combination of software and hardware.
- the program 1030 may be tangibly contained in a computer readable medium which may be included in the device 1000 (such as in the memory 1020) or other storage devices that are accessible by the device 1000.
- the device 1000 may load the program 1030 from the computer readable medium to the RAM 1022 for execution.
- the computer readable medium may include any types of non-transitory storage medium, such as ROM, EPROM, a flash memory, a hard disk, CD, DVD, and the like.
- the term “non-transitory, ” as used herein, is a limitation of the medium itself (i.e., tangible, not a signal) as opposed to a limitation on data storage persistency (e.g., RAM vs. ROM) .
- FIG. 11 shows an example of the computer readable medium 1100 which may be in form of CD, DVD or other optical storage disk.
- the computer readable medium 1100 has the program 1030 stored thereon.
- various embodiments of the present disclosure may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. Some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controller, microprocessor or other computing device. While various aspects of embodiments of the present disclosure are illustrated and described as block diagrams, flowcharts, or using some other pictorial representations, it is to be understood that the block, apparatus, system, technique or method described herein may be implemented in, as non-limiting examples, hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof.
- Some example embodiments of the present disclosure also provide at least one computer program product tangibly stored on a computer readable medium, such as a non-transitory computer readable medium.
- the computer program product includes computer-executable instructions, such as those included in program modules, being executed in a device on a target physical or virtual processor, to carry out any of the methods as described above.
- program modules include routines, programs, libraries, objects, classes, components, data structures, or the like that perform particular tasks or implement particular abstract data types.
- the functionality of the program modules may be combined or split between program modules as desired in various embodiments.
- Machine-executable instructions for program modules may be executed within a local or distributed device. In a distributed device, program modules may be located in both local and remote storage media.
- Program code for carrying out methods of the present disclosure may be written in any combination of one or more programming languages.
- the program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program code, when executed by the processor or controller, cause the functions/operations specified in the flowcharts and/or block diagrams to be implemented.
- the program code may execute entirely on a machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
- the computer program code or related data may be carried by any suitable carrier to enable the device, apparatus or processor to perform various processes and operations as described above.
- Examples of the carrier include a signal, computer readable medium, and the like.
- the computer readable medium may be a computer readable signal medium or a computer readable storage medium.
- a computer readable medium may include but not limited to an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of the computer readable storage medium would include an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM) , a read-only memory (ROM) , an erasable programmable read-only memory (EPROM or Flash memory) , an optical fiber, a portable compact disc read-only memory (CD-ROM) , an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Theoretical Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Selon des exemples de modes de réalisation, la présente invention concerne une contre-mesure de sécurité pour un contrôle d'admission de tranche de réseau (NSAC) distribué. Plus précisément, un premier dispositif reçoit d'un deuxième dispositif un premier message servant à mettre à jour ou à rapporter un nombre d'admission d'équipements utilisateur (UE) ou de sessions d'unité de données par paquets (PDU) associés à une zone de desserte correspondant au deuxième dispositif, le nombre d'admission étant spécifique à une tranche ou à des informations d'aide à la sélection de tranche de réseau unique (S-NSSAI). Puis le premier dispositif détermine un premier nombre d'UE ou de sessions PDU spécifiques à la tranche ou aux S-NSSAI comptés par au moins un troisième dispositif, de manière à vérifier le nombre d'admission avec le premier nombre, et effectue une procédure de contrôle d'admission sur la base, au moins en partie, du premier nombre.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2022/125268 WO2024077582A1 (fr) | 2022-10-14 | 2022-10-14 | Contre-mesure de sécurité pour contrôle d'admission de tranche de réseau distribué |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2022/125268 WO2024077582A1 (fr) | 2022-10-14 | 2022-10-14 | Contre-mesure de sécurité pour contrôle d'admission de tranche de réseau distribué |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024077582A1 true WO2024077582A1 (fr) | 2024-04-18 |
Family
ID=90668572
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/125268 WO2024077582A1 (fr) | 2022-10-14 | 2022-10-14 | Contre-mesure de sécurité pour contrôle d'admission de tranche de réseau distribué |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2024077582A1 (fr) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200396648A1 (en) * | 2019-06-16 | 2020-12-17 | Qualcomm Incorporated | Handling of network slice information for roaming user equipment (ue) |
US20210337383A1 (en) * | 2020-04-22 | 2021-10-28 | Qualcomm Incorporated | Network slice authentication for default slices |
CN115134869A (zh) * | 2021-03-29 | 2022-09-30 | 华为技术有限公司 | 网络切片的准入控制方法及装置 |
US20220330139A1 (en) * | 2021-04-09 | 2022-10-13 | Samsung Electronics Co., Ltd. | Method and apparatus for managing network slice in wireless communication system |
US20220330093A1 (en) * | 2021-04-07 | 2022-10-13 | At&T Intellectual Property I, L.P. | Facilitation of software-defined network slicing for 5g or other next generation network |
WO2022216087A1 (fr) * | 2021-04-09 | 2022-10-13 | Samsung Electronics Co., Ltd. | Procédés et systèmes de gestion de contrôle d'admission de tranche de réseau pour un équipement d'utilisateur |
-
2022
- 2022-10-14 WO PCT/CN2022/125268 patent/WO2024077582A1/fr unknown
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200396648A1 (en) * | 2019-06-16 | 2020-12-17 | Qualcomm Incorporated | Handling of network slice information for roaming user equipment (ue) |
US20210337383A1 (en) * | 2020-04-22 | 2021-10-28 | Qualcomm Incorporated | Network slice authentication for default slices |
CN115134869A (zh) * | 2021-03-29 | 2022-09-30 | 华为技术有限公司 | 网络切片的准入控制方法及装置 |
US20220330093A1 (en) * | 2021-04-07 | 2022-10-13 | At&T Intellectual Property I, L.P. | Facilitation of software-defined network slicing for 5g or other next generation network |
US20220330139A1 (en) * | 2021-04-09 | 2022-10-13 | Samsung Electronics Co., Ltd. | Method and apparatus for managing network slice in wireless communication system |
WO2022216087A1 (fr) * | 2021-04-09 | 2022-10-13 | Samsung Electronics Co., Ltd. | Procédés et systèmes de gestion de contrôle d'admission de tranche de réseau pour un équipement d'utilisateur |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10638356B2 (en) | Transmission of network slicing constraints in 5G wireless networks | |
US11683087B2 (en) | Cloud based access solution for enterprise deployment | |
EP3780679A1 (fr) | Prise en charge d'itinérance pour architecture de tranche de nouvelle génération | |
CN107810623B (zh) | 跨多个网络功能实例的多安全性级别/业务管理 | |
US11723056B2 (en) | Efficient discovery of edge computing servers | |
CN111132344A (zh) | 跨载波调度方法、装置及存储介质 | |
US11856396B2 (en) | System and method for security activation with session granularity | |
CN111434083A (zh) | 用于netconf的网络管理设备和集中式授权服务器 | |
WO2022073213A1 (fr) | Mécanisme d'autorisation dynamique | |
US11985079B2 (en) | Method and device in UE and base station for wireless communication | |
EP3687135A1 (fr) | Surveillance de dispositifs, et procédé et appareil de désinscription | |
JP2023529445A (ja) | Nwdafの機能を改善してsmfが重複送信を効果的にするための方法 | |
WO2024077582A1 (fr) | Contre-mesure de sécurité pour contrôle d'admission de tranche de réseau distribué | |
US20230269655A1 (en) | Network slicing for private cellular networks | |
WO2021244600A1 (fr) | Procédé et dispositif dans un nœud pour une communication sans fil | |
WO2023070340A1 (fr) | Commande de politique de fonction de référentiel de réseau pour différents réseaux mobiles terrestres publics | |
WO2024098177A1 (fr) | Procédure d'authentification pour tranche de réseau | |
WO2022094995A1 (fr) | Anonymisation de données permettant la minimisation "drive-test" | |
EP4325772A1 (fr) | Utilisation d'un jeton d'accès dans une architecture basée sur un service | |
EP4270870A1 (fr) | Procédé, dispositif et support lisible par ordinateur pour des communications | |
US20230058943A1 (en) | Apparatus, Method and Computer Program | |
WO2024164311A1 (fr) | Équilibre entre performance et sécurité d'une tranche de réseau | |
US20240187532A1 (en) | Systems and methods for generating network policy decisions for data sessions | |
US20230413052A1 (en) | Access token revocation in security management | |
US20240314557A1 (en) | Network repository function services access authorization |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22961770 Country of ref document: EP Kind code of ref document: A1 |