Oracle Corporation
METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR MITIGATING 5G ROAMING SPOOFING ATTACKS
Last updated:
Abstract:
Roaming spoofing attacks can be initiated during N32-c handshake procedure used for inter-PLMN communication in 5G network. One example solution described herein uses the SEPP to mitigate the N32-c roaming spoofing attacks by cross validating the sender attribute present in N32-c handshake security capability exchange messages against the endpoint identity in the X.509v3 certificate shared during TLS handshake and the remote SEPP identity configured in the SEPP's local database.
Status:
Application
Type:
Utility
Filling date:
11 Nov 2020
Issue date:
31 Mar 2022