Patent classifications
H04W12/73
Detection of false base stations based on signal times of arrival
Apparatus, methods, and computer-readable media for facilitating detection of false base stations based on signal times of arrival are disclosed herein. An example method for wireless communication of a UE includes receiving a signal from each of one or more neighboring base stations. The example method also includes determining a system timing associated with the wireless communications network based on a respective time of arrival at which each signal is received from the neighboring base stations. The example method also includes receiving a signal from an FBS, the FBS signal being associated with a PCI different than the PCIs associated with the signals received from each of the neighboring base stations. Additionally, the example method includes identifying a presence of the FBS based on a difference between the system timing and a time of arrival at which the signal is received from the FBS.
MAINTAINING CONTINUOUS WIRELESS SERVICE DURING POLICY ENFORCEMENT
A wireless security method performed by a network monitoring system for a wireless station, the method maintaining continuous wireless service, the method including identifying a desired network, to which the wireless station is currently connected vis a legitimate access point, as having become an undesirable network, based on a network security policy, and based on network variables, activate the legitimate access point to create a desired network, comprising changing network variables of the undesired network, and maintaining the wireless station connection to the network, based on the security policy.
MAINTAINING CONTINUOUS WIRELESS SERVICE DURING POLICY ENFORCEMENT
A wireless security method performed by a network monitoring system for a wireless station, the method maintaining continuous wireless service, the method including identifying a desired network, to which the wireless station is currently connected vis a legitimate access point, as having become an undesirable network, based on a network security policy, and based on network variables, activate the legitimate access point to create a desired network, comprising changing network variables of the undesired network, and maintaining the wireless station connection to the network, based on the security policy.
Identity-based encryption of a message associated with a connection procedure
Methods, systems, and devices for wireless communications are described. A user equipment (UE) may receive a system parameter identified by a network entity (e.g., a public key generator (PKG)), and receive a cell identifier during a connection procedure between the UE and a base station in wireless communication with the UE. The cell identifier may be associated with the base station. The UE may encrypt at least a portion of a message associated with the connection procedure using the cell identifier and the system parameter. In some examples, the portion of the message may include private information. The UE may transmit the message to the base station as part of the connection procedure.
METHOD FOR AUTOMATICALLY ACCESSING WIRELESS LOCAL AREA NETWORK BY INTERNET OF THINGS DEVICE, AND APPARATUS
A method and apparatus for automatically accessing a wireless local area network (WLAN) by an Internet of Things (IoT) device provides operation so that the IoT device can automatically access the WLAN. This reduces operation workload of network operation personnel, and reduces enterprise costs. The method includes: sending, by a network device to the IoT device, a first packet carrying a first SSID and first indication information that indicates the IoT device to access a first WLAN identified by the first SSID; parsing, by the IoT device, the first packet to obtain the first indication information; and sending, based on the first indication information, a first access request to request to access the first WLAN identified by the first SSID.
METHOD FOR AUTOMATICALLY ACCESSING WIRELESS LOCAL AREA NETWORK BY INTERNET OF THINGS DEVICE, AND APPARATUS
A method and apparatus for automatically accessing a wireless local area network (WLAN) by an Internet of Things (IoT) device provides operation so that the IoT device can automatically access the WLAN. This reduces operation workload of network operation personnel, and reduces enterprise costs. The method includes: sending, by a network device to the IoT device, a first packet carrying a first SSID and first indication information that indicates the IoT device to access a first WLAN identified by the first SSID; parsing, by the IoT device, the first packet to obtain the first indication information; and sending, based on the first indication information, a first access request to request to access the first WLAN identified by the first SSID.
ENCRYPTED NONCES AS ROTATED DEVICE ADDRESSES
Rotation of a wireless client device address is based on an encryption key and a nonce value. Key information and nonce value information are shared between a wireless client device and a network infrastructure component over a secure communication channel. The wireless client device encrypts the nonce value using the key information and encodes the encrypted value as a device address. The wireless client device then identifies itself via a source address value in a message transmitted over a wireless network. Upon receiving the message, the network infrastructure component decrypts information derived from the source address value and compares the resulting data to the nonce value. If a match is identified, the network infrastructure identifies the wireless client device as a source of the message. In some embodiments, the nonce value is updated with each rotation to provide for improved entropy of generated device addresses.
ENCRYPTED NONCES AS ROTATED DEVICE ADDRESSES
Rotation of a wireless client device address is based on an encryption key and a nonce value. Key information and nonce value information are shared between a wireless client device and a network infrastructure component over a secure communication channel. The wireless client device encrypts the nonce value using the key information and encodes the encrypted value as a device address. The wireless client device then identifies itself via a source address value in a message transmitted over a wireless network. Upon receiving the message, the network infrastructure component decrypts information derived from the source address value and compares the resulting data to the nonce value. If a match is identified, the network infrastructure identifies the wireless client device as a source of the message. In some embodiments, the nonce value is updated with each rotation to provide for improved entropy of generated device addresses.
METHODS AND APPARATUS TO REDIRECT INTERNET CLIENTS FOR MEDIA MONITORING
Methods, apparatus, systems and articles of manufacture are disclosed to redirect internet clients for media monitoring. An example apparatus disclosed herein includes a wireless communication controller to establish a plurality of connections to a WI-FI router, the plurality of connections corresponding to simulated WI-FI clients, and a client interface to identify a connection of a WI-FI client to the apparatus and route network traffic of the WI-FI client to the WI-FI router via the plurality of connections.
Location-based mobile device authentication
A computer server is disclosed that may include a processing unit and a computer-readable memory that may store computer-executable instructions that are executable by the processing unit to cause the computer server to perform various operations. The computer server may receive location data from a mobile client device and may compare the location data to predefined secure location definitions, which may be trusted or private locations. The computer server may receive a request from the mobile client device to access network resources or services, and the computer server may determine, using a result of comparing the location data and the one or more predefined secure location definitions, an authentication process for providing the mobile client device with access to the network resources or services. The computer server may execute the authentication process and may provide the mobile client device with access to the network resources or services.