US 12,375,978 B2
Physical layer techniques to mitigate the handover process vulnerabilities
Kathiravetpillai Sivanesan, Portland, OR (US); Christian Maciocco, Portland, OR (US); Rath Vannithamby, Portland, OR (US); and Liuyang Lily Yang, Portland, OR (US)
Assigned to Intel Corporation, Santa Clara, CA (US)
Filed by Intel Corporation, Santa Clara, CA (US)
Filed on Sep. 24, 2021, as Appl. No. 17/483,912.
Prior Publication US 2023/0095401 A1, Mar. 30, 2023
Int. Cl. H04L 12/00 (2006.01); H04W 36/00 (2009.01)
CPC H04W 36/0058 (2018.08) [H04W 36/0085 (2018.08)] 20 Claims
OG exemplary drawing
 
1. An apparatus for a serving network node, the apparatus comprising:
processing circuitry configured to:
decode a measurement report from a user equipment (UE) served by the serving network node;
determine that the UE is to handover to a target network node based on the measurement report;
determine whether the UE has initiated handover greater than a threshold number of times in a predetermined amount of time;
initiate handover of the UE to the target network node in response to a determination that the UE has not initiated handover greater than the threshold number of times in the predetermined amount of time;
in response to a determination that the UE has initiated handover greater than the threshold number of times in the predetermined amount of time, determine whether initiation of the handover to the target network node is legitimate based on physical (PHY) layer properties that include UE parameters; and
in response to a determination that initiation of the handover is not legitimate, terminate the handover and deny additional handover attempts by the UE for a set amount of time; and
a memory configured to store the threshold number of times.