Oracle Corporation
METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR MITIGATING 5G ROAMING SPOOFING ATTACKS

Last updated:

Abstract:

Roaming spoofing attacks can be initiated during N32-c handshake procedure used for inter-PLMN communication in 5G network. One example solution described herein uses the SEPP to mitigate the N32-c roaming spoofing attacks by cross validating the sender attribute present in N32-c handshake security capability exchange messages against the endpoint identity in the X.509v3 certificate shared during TLS handshake and the remote SEPP identity configured in the SEPP's local database.

Status:
Application
Type:

Utility

Filling date:

11 Nov 2020

Issue date:

31 Mar 2022