Securing Network Steering Information

ABSTRACT

According to certain embodiments, a method by a user equipment (UE) for securing network steering information includes transmitting a registration request to a Visited Public Land Mobile Network (VPLMN). Upon successful authentication b an authentication server function (AUSF), a home network root key is generated. A protected message comprising Network Steering information is received from a first network node. The protected message is protected using a configuration key (Kconf) and a first Message Authentication Code (MAC-1). The configuration key (Kconf) is determined from the home network root key, and the UE verifies the MAC-1. Based on the Kconf and the MAC-1, it is verified that the VPLMN did not alter Network Steering Information. An acknowledgement message, which is protected with a second Message Authentication Code (MAC-2), is transmitted to a Home Public Land Mobile Network (HPLMN).

TECHNICAL. FIELD

Certain embodiments of the present disclosure relate, in general, towireless communications and more particularly to securing networksteering information.

BACKGROUND

3GPP TSG S3-171733/S2-175286 discuss LS on Public Land Mobile Network(PLMN) and Radio Access Technology (RAT) selection policies for roaming.Specifically, an LS from System Aspects Working Group 2 (SA2) wasreceived in System Aspects Working Group 3 (SA3)#88 in 3GPP TSGS3-171733/S2-175286. The LS from SA2 in 3GPP TSG S3-171733/S2-175286states that there is a need to define a standardized way to allow agiven Home Public Land Mobile Network (HPLMN) to provide its roaminguser equipments (UEs) with information about preferred networks and RATdepending on the UE current location.

SA2 submitted for consideration the following requirements in SA2 didsubmit for consideration the following requirements in 3GPP TSGS3-171733/S2-175286:

-   -   A control plane solution is used from the (VPLMN) to the UE.    -   Visited Public Land Mobile Network (VPLMN) is able to relay this        information to the UE.    -   VPLMN shall not be able to alter the information sent by the        HPLMN (i.e., UE should be able to check the integrity of the        information provided to it.    -   UE should be able to detect if VPLMN altered or removed those        information and act accordingly.

System Aspects Working Group 1 (SA1) replied in 3GG TSG S1-173478 withreferences to corresponding service requirements in TS 22.261(subclauses 5.1.2.1 and 6.19), and TS 22.011 (subclause 3.2.2.8). SA1requirements seem to stress that: the HPLMN should be able to steer orredirect the UE for a specific VPLMN at any time.

C1-173751 discusses a reply LS to LS on PLMN and RAT selection policiesfor roaming, (S2-175286/C1-172866). CT1 indicated in C1-173751 that CT1is responsible for the stage 2 specification (TS 23.122), and asks SA3to investigate end-to-end security solution based on requirements inS3-171733/S2-175286 before CT1 specifies any solution to therequirements.

In addition, another paper in 3GPP TSG S3-172034 was submitted to SA3#88 on the topic of securing the Network Steering Information, A relateddiscussion paper from Samsung is in SA3#88. Two different alternativeswere discussed in 3GPP TSG S3-172034, The two potential securitycredentials to be considered to secure the information from the AUSF (inthe HPLMN) to the UE were:

-   -   Using HN asymmetric key    -   Using an anchor key resulted from primary authentication.

In the conclusion in 3GPP TSG S3-172034, the second alternative (i.e.,using an anchor key resulted from primary authentication) was indicatedto be preferred. However, not all operators may not support a HNasymmetric key.

SUMMARY

Certain embodiments described herein address the problems of previoustechniques for securing network steering information.

According to certain embodiments, a method by a user equipment (UE) forsecuring network steering information includes transmitting aregistration request to a Visited Public. Land Mobile'Network (VPLMN).Upon successful authentication by an authentication server function(AUSF), a home network root key is generated. A protected messagecomprising Network Steering Information is received from a first networknode. The protected message is protected using a configuration key(Kconf) and a first Message Authentication Code (MAC-1). Theconfiguration key (Kconf) is determined from the home network root key,and the UE verifies the MAC-1. Based on the Kconf and the MAC-1, it isverified that the VPLMN did not alter Network Steering Information. Auacknowledgement message, which is protected with a second MessageAuthentication Code (MAC-2), is transmitted to a Home Public Land MobileNetwork (HPLMN).

According to certain embodiments, a UE comprises memory operable tostore instructions and processing circuitry operable to execute theinstructions to cause the UE to transmit a registration request to aVPLMN, Upon successful authentication by an AUSF, a home network rootkey is generated. A protected message comprising Network SteeringInformation is received from a first network node. The protected messageis protected using a Kconf and a MAC-1. The Kconf is determined from thehome network root key, and the UE verifies the MAC-1. Based on the Kconfand the MAC-1, it is verified that the VPLMN did not alter NetworkSteering Information. An acknowledgement message, which is protectedwith a second MAC-2, is transmitted to a HPLMN.

According to certain embodiments, a method for securing network steeringinformation by a first network node operating as an AUSF includesgenerating a home network root key. Network Steering Information isreceived from a second network node, and a Kconf is determined from thehome network key. A protected message comprising the Network SteeringInformation is generated and is protected using the Kconf and a MAC-1.The protected message comprising the Network Steering Information istransmitted to a UE. An acknowledgment message is received from the UE.The acknowledgement message is protected with a MAC-2 and indicates thatthe VPLMN did not alter the Network Steering Information. Theacknowledgment message indicating that the VPLMN did not alter theNetwork Steering Information is forwarded to the second network node.

According to certain embodiments, a first network node operating as anAUSF for securing network steering information is provided. The firstnetwork node includes memory operable to store instructions andprocessing circuitry operable to execute the instructions to cause thenetwork node to generate a home network root key. Network SteeringInformation is received from a second network node, and a Kconf isdetermined from the home network key. A protected message comprising theNetwork Steering Information is generated and is protected using theKconf and a MAC-1. The protected message comprising the Network SteeringInformation is transmitted to a UE. An acknowledgment message isreceived from the UE, The acknowledgement message is protected with aMAC-2 and indicates that the VPLMN did not alter the Network Steeringinformation. The acknowledgment message indicating that the VPLMN didnot alter the Network Steering Information is forwarded to the secondnetwork node.

According to certain embodiments, a method for securing network steeringinformation by a first network node includes transmitting NetworkSteering Information and a MAC-1 to a second network node operating asan AUSF for protection of the Network Steering Information using a Kconfand the MAC-1. An acknowledgement message is received from the UE and isprotected with a MAC-2. The acknowledgment indicates that die VPLMN didnot alter the Network Steering Information, The MAC-2 is verified and itis determined. based on the acknowledgement, that the VPLMN did notalter the Network Steering Information.

According to certain embodiments, a first network node i provided forsecuring network steering information. The network node comprises memoryoperable to store instructions and processing circuitry operable toexecute the instructions to cause the network node transmit NetworkSteering Information and a MAC-1 to a second network node operating asan AUSF for protection of the Network Steering Information using a Kconfand the MAC-1. An acknowledgement message is received from the UE and isprotected with a MAC-2. The acknowledgment indicates that the VPLMN didnot alter the Network Steering Information. The MAC-2 is verified and itis determined, based on the acknowledgement, that the VPLMN did notalter the Network Steering Information.

Embodiments of the present disclosure may provide one or more technicaladvantages. As an example, an advantage of certain embodiments mayprovide an end-to-end solution, in which a node in the HPLMN, such asfor example the AUSF, may send an integrity protected Network SteeringInformation to the UE. Another advantage may be that the solution isderived from the primary authentication of the HPLMN, using a key thatis known only by the UE and the HPLMN. As another example, an advantagemay be that the solution may be enhanced with end-to-end encryption suchthat the Network Steering Information may be bidden from the VPLMN.Still another advantage may be that certain embodiments provideacknowledgement of receipt of Network Steering Information by the UEsuch that the HPLMN knows if the UE received the information.

Certain embodiments may include none, some, or all of these advantages.Certain embodiments may include other advantages, as would be understoodby a person having ordinary skill in the art.

DETAILED DESCRIPTION

According to certain embodiments, an end-to-end solution is, provided,in which a node in the Home Public Land Mobile Network (HPLMN) such as,for example, an authentication server function (AUSF) may send integrityprotected Network Steering Information to the user equipment (UE). In aparticular embodiment, the solution is based on the Kausf, derived fromthe primary authentication. This key would be known only by the UE andthe HPLMN. Thus, a key may be derived from Kausf resulted from primaryauthentication is used to secure the Network Steering Information fromthe Home Public Land Mobile Network (HPLMN) to the equipment (UE). In aparticular embodiment, the key is a configuration key and the NetworkSteering Information is a preferred Public Land Mobile Network (PLMN)and Radio Access Technology (RAT) list. Specifically, according tocertain embodiments, the AUSF in the HPLMN calculates a messageauthentication code over the Network Steering Information using thisconfiguration key.

In a particular embodiment, the solution may be enhanced with end-to-endencryption. An advantage of encryption may be that the Network SteeringInformation may be hidden from the Visited Public Land Mobile Network(VPLMN). Additionally, confidentiality protection over the air interfacemay be achieved by Non Access Stratum (NAS) security. However, the usageof any form of confidentiality protection may be subject to regional ornational regulatory policies.

detection of removal of Network Steering Information by the VPLMN is achallenge. Accordingly, certain embodiments provided herein, propose theusage of acknowledge message back to the HPLMN so that at least HPLMNknows if the UE received the information. For example, a UE may send anacknowledge message when it has received the Network SteeringInformation. In a particular embodiment, the acknowledge message may beintegrity protected by the UE. Specifically, a Network Steeringacknowledgement (ACK) is protected end-to-end between UE and a node inthe HPLMN. Upon receipt of the Network Steering ACK, the HPLMN may knowif the VPLMN delivered the message. It is noted that the NetworkSteering information may re-direct the UE to another VPLMN, andconsequently the VPLMN may not have interest to deliver it.

According to certain particular embodiments, some additional potentialparameters considered include:

-   -   Configuration key identifier: This identifier may tie the        configuration key to the Kausf from which it has been derived.        In a particular embodiment, for example, the configuration key        identifier may be the random challenge (RAND) generated by the        AUSF and issued to the MS.    -   Integrity protection algorithm identifier: In a particular        embodiment, if the integrity algorithm is not identified        separately, it may be the well-known KDF function typically used        in 3GPP networks, i.e., HMAC-SHA-256 (cf. 3GPP TS 33.401 Annex        A, and TGPP TS 33.220 Annex B).    -   Counter: If the same configuration key is used to calculate more        than one medium access control (MAC), then an additional counter        is preferred as a parameter for detecting replay protection in        the UE.

FIG. 1 illustrates an example signaling flow 100 demonstratingprovisioning, of the Network Steering Information from HPLMN to the UE102, according to certain embodiments. More specifically, FIG. 1demonstrates an example of the UE Registration procedure when the AUSF104 in the home network performs the integrity protection of the NetworkSteering Information and includes the security protected NetworkSteering Information over the N12 interface to the Access MobilityFunction/Security Anchor Function (AMF/SEAF) 106 in the Visited PublicLand Mobile Network (VPLMN). The AMF/SEAF 106 sneds the protectedNetwork Steering Information to the UE 102 in a Non Access Stratum (NAS)message. In a particular embodiment, for example, the AMF/SEAF 106 sendsthe protected Network Steering Information to the UE 102 in aRegistration Accept message. it is noted that the example provided is anexample optimization. In a particular embodiment, the HPLMN should beable to send the Network Steering Information at any time to the UE 102.Thus, the HPLMN may not be limited to sending the Network SteeringInformation to the UE 102 only during Registration procedure.

As depicted in FIG. 1, the signaling flow according to certainembodiments is:

-   -   1. The UE 102 registers to the VPLMN and is authenticated by        AUSF 104.    -   2. The UE 102 and AUSF 104 generate Kausf.    -   3. A node in the HPLMN (e.g. User Data Management (UDM) 108)        sends the Network Steering information to AUSF 104. In the        depicted embodiment, the AUSF 104 protects the Network Steering        Information. However, some other node could protect the Network        Steering Information. For example, the Policy Control Function        could protect the Network. Steering Information. in a particular        embodiment.    -   4. The AUSF 104 derives the configuration key (Kconf) from the        home network root key (Kausf) and calculates the Message        Authentication Code (MAC-1) over Network Steering Information.    -   5. The AUSF 104 forwards the protected Network Steering        Information to AMF/SEAF.    -   6. The AMF/SEAF forwards the protected Network Steering        Information to the UE 102. In a particular embodiment, this        message could be confidentiality protected over the air with NAS        security. In a particular embodiment, the Network Steering        Information could be piggybacked such as, for example, in a        Registration Accept message.    -   7. The UE 102 derives the configuration key (Kconf) from the        borne network root key (Kausf) and verifies the MAC-1. In a        particular embodiment, the UE 102 may send an acknowledgement        message (“Network Steering ACK”) to the HPLMN and protect that        information with the MAC-2.    -   8. The UE 102 sends the protected ACK message to the AMF/SEAF.    -   9. The AMF/SEAF forwards the protected ACK to the AUSF.    -   10. AUSF verifies the MAC-2 in the protected Network Steering        ACK message.    -   11. AUSF forwards the ACK to the original source of the Network        Steering Information.

FIG. 2 illustrates another example signaling flow 200 showingprovisioning of the Network Steering Information from the HPLMN to theUE 202, according to certain embodiments. More specifically, FIG. 2demonstrates a scenario when a node other than AUSF 204 is in charge ofdelivering the Network Steering Information. For example, in thedepicted embodiment, the Point Coordination Function (PCF) 208 deliversthe Network Steering Information. The PCF 208 is just one example,however, and the Network Steering Information may be delivered byanother node in other embodiments.

As depicted in FIG. 2, the signaling flow 200 according to certainembodiments is:

-   -   1. The UE 202 registers to the VPLMN, and is authenticated by        the AUSF 204.    -   2. The UE 202 and AUSF 204 generate Kausf.    -   3. A node in the HPLMN sends a key request to the AUSF 204. In        the depicted example embodiment., the PCF 208 sends the key        request to the AUSF 204. According to a particular embodiment,        it may be assumed that the AUSF 204 only derives further keys        from the home network root key (Kausf) and acts as an key        management server and distributes such keys in HPLMN.    -   4. The AUSF 204 derives the configuration key (Kconf) from the        home network root key (Kausf).    -   5. The AUSF 204 sends the Key response with the configuration        key (Kconf) to the PCF 208.    -   6. The PCF 208 constructs the Network Steering Information, and        protects it with MAC-1.    -   7. The PCF 208 sends the protected Network Steering Information        to the UE 202. According to particular embodiments, there may be        intermediate nodes between the PCF 208 and the UE 202, which may        receive and forward the protected Network Steering Information,        in certain embodiments.    -   8. The UE derives the configuration key (Kconf) from the home        network root key (Kausf) and verifies the MAC-1. In a particular        embodiment, the UE 202 may send an acknowledgement message        (“Network Steering ACK”) to the PCE 208 and protect that        information with the MAC-2.    -   9. The UE 202 sends the, protected ACK message to the PCF 208.        According to particular embodiments, there may be intermediate        nodes between the node and the UE 202.    -   10. The PCF 208 verifies the MAC-2 in the protected Network        Steering ACK message.

UE 202 detection of the removal of Network Steering information by aVPLMN is difficult. This may require that the UE 202 is able to expectsuch message to arrive, and AUSF 204 would send the message (with theMAC) even when nothing needs to be configured. Such a messaging schememay not be efficient and would not guarantee the delivery at any timebut only when the UE 202 expects them to arrive. As such, according tocertain embodiments, the use of the acknowledge message back to theHPLMN is proposed so that at least HPLMN is able to detect the failureof delivery.

FIG. 3 illustrates an example embodiment of a network 300 retransmissionscheme for securing network steering information, in accordance withcertain embodiments. Network 300 includes one or more UE(s) 310 (whichmay be interchangeably referred to as wireless devices 310) and one ormore network node(s) 315 (which may be interchangeably referred to asgNBs 315). UEs 310 may communicate with network nodes 315 over awireless interface. For example, a UE 310 may transmit wireless signalsto one or more of network nodes 315, and/or receive wireless signalsfrom one or more of network nodes 315. The wireless signals may containvoice traffic, data traffic, control signals, and or any other suitableinformation. In some embodiments, an area of wireless signal coverageassociated with a network node 315 may be referred to as a cell 325. Insome embodiments, UEs 310 may have device-to-device (D2D) capability.Thus, UEs 310 may be able to receive signals from and or transmitsignals directly to another UE.

In certain embodiments, network nodes 315 may interface with a radionetwork controller. The radio network controller may control networknodes 315 and may provide certain radio resource management functions,mobility management functions, and other suitable functions. In certainembodiments, the functions of the radio network controller may beincluded in network node 315. The radio network controller may interfacewith a core network node. In certain embodiments, the radio networkcontroller may interface with the core network node via aninterconnecting network 320. Interconnecting network 320 may refer toany interconnecting system capable of transmitting audio, video,signals, data, messages, or any combination of the preceding.Interconnecting network 320 may include all or a portion of a publicswitched telephone network (PSTN), a public or private data network, alocal area network (LAN), a metropolitan area network (MAN), a wide areanetwork (WAN), a local, regional, or global communication or computernetwork such as the Internet, a wireline or wireless network, anenterprise intranet, or any other suitable communication link, includingcombinations thereof.

In some embodiments, the core network node may manage the establishmentof communication sessions and various other functionalities for UEs 310.UEs 310 may exchange certain signals with the core network node usingthe non-access stratum (NAS) layer. In non-access stratum signaling,signals between UEs 310 and the core network node may be transparentlypassed through the radio access network, In certain embodiments, networknodes 315 may interface with one or more network nodes over an internodeinterface.

As described above, example embodiments of network 300 may include oneor more wireless devices 310, and one or more different types of networknodes capable of communicating (directly or indirectly) with wirelessdevices 310.

In some embodiments, the non-limiting term UE is used. UEs 310 describedherein can be any type of wireless device capable of communicating withnetwork nodes 315 or another UE over radio signals. UE 310 may also be aradio communication device, target device, D2D UE, NB-IoT device, MTC UEor UE capable of machine-to-machine communication (M2M), low-cost and/orlow-complexity UE, a sensor equipped with UE, Tablet, mobile terminals,smart phone, laptop embedded equipped (LEE), laptop mounted equipment(LME), USB dongles, Customer Premises Equipment (CPE), etc.

Also, in some embodiments, generic terminology “radio network node” (orsimply “network node”) is used. It can be any kind of network node,which may comprise a gNB, base station (BS), radio base station, Node B,base station (BS), multi-standard radio (MSR) radio node such as MSR BS,evolved Node B (eNB), network controller, radio network controller(RNC), base station controller (BSC), relay node, relay donor nodecontrolling relay, base transceiver station (BTS), access point (AP),radio access point, transmission points, transmission nodes, RemoteRadio Unit (RRU), Remote Radio Head (RRH), nodes in distributed antennasystem (DAS), Multi-cell/multicast Coordination Entity (MCE), corenetwork node (e.g., MSC, MME, etc.), O&M, OSS, SON, positioning node(e.g., E-SMLC). MDT, or any other suitable network node.

The terminology such as network node and UE should be considerednon-limiting and, in particular, does not imply a certain hierarchicalrelation between the two; in general, “eNodeB” could be considered asdevice 1 and “UE” device 2, and these two devices, communicate with eachother over some radio channel.

Example embodiments of UE 310, network nodes 315, and other networknodes (such as radio network controller or core network node) aredescribed in more detail below.

Although FIG. 3 illustrates a particular arrangement of network 300, thepresent disclosure contemplates that the various embodiments describedherein may be applied to a variety of networks having any suitableconfiguration. For example, network 300 may include any suitable numberof UEs 310 and network nodes 315, as well as any additional elementssuitable to support communication between UEs or between a UE andanother communication device (such as a landline telephone).Furthermore, although certain embodiments may be described asimplemented in an NR or 5G network, the embodiments may be implementedin any appropriate type of telecommunication system supporting anysuitable communication and using any suitable components, and areapplicable to any radio access technology (RAT) or multi-RAT systems inwhich a UE receives and/or transmits signals (e.g data). For example,the various embodiments described herein may be applicable to IoT,NB-IoT, LTE, LTE-Advanced, UMTS, HSPA, GSM, cdma2000, WCDMA, WiMax, UMB,WiFi, another suitable radio access technology, or any suitablecombination of one or more radio access technologies.

FIG. 4 illustrates an example wireless device 310 for securing networksteering information, in accordance with certain embodiments. Wirelessdevice 310 may refer to any type of wireless device communicating withanode and/or with another wireless device in a cellular or mobilecommunication system. Examples of wireless device 310 include a mobilephone, a smart phone, a PDA (Personal Digital Assistant), a portablecomputer (e.g., laptop, tablet), a sensor, a modem, an MTCdevice/machine-to-machine (M2M) device, laptop embedded equipment (LEE),laptop mounted equipment (LME), USB dongles, a D2D capable device, oranother device that can provide wireless communication. A wirelessdevice 310 may also be referred to as UE, a station (STA), a device, ora terminal in some embodiments. Wireless device 310 includes transceiver410, processing circuitry 420, and memory 430. In some embodiments,transceiver 410 facilitates transmitting wireless signals to andreceiving wireless signals from network node 315 (e.g., via antenna440), processing circuitry 420 (e,g., which may include one or moreprocessors) executes instructions to, provide some or all of thefunctionality described above as being provided by wireless device 310,and memory 430 stores the instructions executed by processing circuitry420.

Processing circuitry 420 may include any suitable combination ofhardware and software implemented in one or more modules to executeinstructions and manipulate data to perform some or ail of the describedfunctions of wireless device 310, such as the functions of UE 310 (i.e.,wireless device 310) described in relation to any of sections 3, 4, and6 herein. For example, in general, processing circuitry may save acurrent version of system information and/or apply a. previously storedversion of system information based on a system information notification(e.g., system information change notification, system informationmodification, or system information update) received in a paging messagefrom a network node 315. In some embodiments, processing circuitry 420may include, for example, one or more computers, one or more centralprocessing units (CPUs), one or more microprocessors, one or moreapplications, one or more application specific integrated circuits(ASICs), one or more field programmable gate arrays (FPGAs) and/or otherlogic.

Memory 430 is generally operable to store instructions, such as acomputer program, software, an application including one or more oflogic, rules, algorithms, code tables, etc, and/or, other instructionscapable of being executed by a processor. Examples of memory 430 includecomputer memory (for example, Random Access Memory (RAM) or Read OnlyMemory (ROM)), mass storage media (for example, a hard disk), removablestorage media (for example, a Compact Disk (CD) or a Digital Video Disk(DVD)), and/or any other volatile or non-volatile, non-transitorycomputer-readable and/or computer-executable memory devices that storeinformation, data, and/or instructions that may be used by processor420.

Other embodiments of wireless device 310 may optionally includeadditional components beyond those shown in FIG. 4 that may beresponsible for providing certain aspects of the wireless device'sfunctionality, including any of the functionality described above and/orany additional functionality (including any functionality necessary tosupport the solution described above). As just one example, wirelessdevice 310 may include input devices and circuits, output devices, andone or more synchronization units or circuits, which may be part of theprocessing circuitry 420. Input devices include mechanisms for entry ofdata into wireless device 310. For example, input devices may includeinput mechanisms, such as a microphone, input elements, a display, etc.Output devices may include mechanisms for outputting data in audio,video, and/or hard copy format. For example, output devices may includea speaker, a display, etc.

FIG. 5 illustrates an example method 500 by a UE for securing networksteering information, according to certain embodiments. The UE mayinclude a wireless device such as wireless device 310, in a particularembodiment.

At step 502, the UE transmits a registration request to a VPLMN. The UEmay generate a home network root key upon successful authentication byan AUSF at step 504. In a particular embodiment, for example, the UEgenerates a Kausf.

At step 506, the UE receives, from a network node, a protected messagecomprising Network Steering Information, which is protected using aconfiguration key (Kconf) derived from the home network root key and afirst Message Authentication Code (MAC-1).

At step 508, the UE derives the configuration key (Kconf) from the homenetwork rook key. The UE verifies the MAC-1 at step 510. Based on theKconf and the MAC-1, the UE verifies that the VPLMN did not alterNetwork Steering Information at 512. Thereafter, UE transmits anacknowledgement message to a Home Public Land Mobile Network (HPLMN) atstep 514. The acknowledgement message is protected with a second MessageAuthentication Code (MAC-2).

Certain embodiments may comprise more or fewer factions, and the actionsmay be performed in any suitable order.

In certain embodiments. the method for securing network steeringinformation may be performed by a virtual computing device. FIG. 6illustrates an example virtual computing device 600 for securing networksteering information, according to certain embodiments. In certainembodiments, virtual computing device 600 may include modules forperforming steps similar to those described above with regard to themethod illustrated and described in FIG. 5. For example, virtualcomputing device 900 may include a first transmitting module 610, afirst generating module 620, a first receiving module 630, a derivingmodule 640, a first verifying module 650, a second verifying module 660,a second transmitting module 670, and any other suitable modules forsecuring network steering information. In some embodiments, one or moreof the modules may be implemented using processing circuitry 420 of FIG.4, In certain embodiments, the functions of two or more of the variousmodules may be combined into a single module.

The first transmitting module 610 may perform certain of thetransmitting functions of virtual computing device 600. For example, ina particular embodiment, first transmitting module 610 may transmits aregistration request to a VPLMN.

The first generating module 620 may perform certain, of the generatingfunctions of virtual computing device 600. For example, in a particularembodiment, first generating module 620 may generate a home network rootkey upon successful authentication by an AUSF.

The first receiving module 630 may perform certain of the receivingfunctions of virtual computing device 600. For example, in a particularembodiment, first receiving module 630 may receive, from a network node,a protected message comprising Network Steering Information, which isprotected using a configuration key (Kconf) derived from the homenetwork root key and a first Message Authentication Code (MAC-1).

The deriving module 640 may perform certain of the deriving functions ofvirtual computing device 600. For example, in a particular embodiment,deriving module 640 may derive the configuration key (Kconf) from thehome network rook key.

The first verifying module 650 may perform certain of the verifyingfunctions of virtual computing device 600. For example, in a particularembodiment, first verifying module 650 may verify the MAC-1.

The second verifying module 660 may perform certain of the verifyingfunctions of virtual computing device 600. For example, in a particularembodiment, second verifying module 660 may verify that the VPLMN didnot alter Network Steering Information based on the Kconf and the MAC-1.

The second transmitting module 670 may perform certain of thetransmitting functions of virtual computing device 600. For example, ina particular embodiment, second transmitting module 670 may transmit anacknowledgement message to HPLMN.

Other embodiments of virtual computing device 600 may include additionalcomponents beyond those shown in FIG. 6 that may be responsible forproviding certain aspects of the UE's functionality, including any ofthe functionality described above and/or any additional functionality(including any functionality necessary to support the solutionsdescribed above). The various different types of UES which may comprisethe transmitter may include components having the same physical hardwarebut configured (e.g., via programming) to support different radio accesstechnologies, or may represent partly or entirely different physicalcomponents.

FIG. 7 illustrates an example method 700 by a UE for securing networksteering information, according to certain embodiments. The UE mayinclude a wireless device such as wireless device 310, in a particularembodiment.

At step 702, the UE transmits a registration request to a VPLMN.

At step 704, the UE generates a home network root key upon successfulauthentication by an AUSF.

At step 706, the UE receives, from a first network node, a protectedmessage comprising Network Steering Information, which is protectedusing a Kconf and a MAC-1.

In a particular embodiment, the first network node comprises the AUSF.In a particular embodiment, the Network Steering Information may begenerated by a second network node such as, for example, a UDM, andprotected by the AUSF.

In yet another particular embodiment, a third network node located inthe VPLMN may include A MF/SEAF which forwards the protected messagecomprising the Network Steering Information from the second networknode.

In a particular embodiment, the protected message may be confidentialityprotected over the air with NAS security. Additionally or alternatively,the protected message may be piggybacked with a Registration Acceptmessage, in a particular embodiment.

At step 708, the UE determines the configuration key (Kconf) from thehome network rook key. In a particular embodiment, the configuration keyis the home network root key. Additionally or alternatively, the homenetwork root key is a Kausf, in a particular embodiment.

At step 710, the UE verifies the MAC-1.

At step 712 based on the Kconf and the MAC-1, the UE verifies that theVPLMN did not alter Network Steering Information.

At step 714, the UE transmits an acknowledgement message to HPLMN. Theacknowledgement message is protected with a MAC-2.

Certain embodiments may comprise more or fewer actions, and the actionsmay be performed in any suitable order.

In certain embodiments, the method for securing network steeringinformation may be performed by a virtual computing device. FIG. 8illustrates an example virtual computing device 800 for securing networksteering information, according to certain embodiments. In certainembodiments, virtual computing device 800 may include modules forperforming steps similar to those described above with regard to themethod illustrated and described in FIG. 7. For example, virtualcomputing device 800 may include a first transmitting module 810, afirst generating module 820, a first receiving module 830, a determiningmodule 840, a first verifying module 850, a second verifying module 860,a second transmitting module 870, and any other suitable modules forsecuring network steering information. In some embodiments, one or moreof the modules may be implemented using processing circuitry 420 of FIG.4. In certain embodiments, the functions of two or more of the variousmodules may be combined into a single module.

The first transmitting module 810 may perform certain of thetransmitting functions of virtual computing device 800. For example, ina particular embodiment, first transmitting module 810 may transmits aregistration, request to a VPLMN.

The first generating module 820 may perform certain of the generatingfunctions of virtual computing device 800. For example, in a particularembodiment, first generating module 820 may generate a home network rootkey upon successful authentication by an AUSF.

The first receiving module 830 may perform certain of the receivingfunctions of virtual computing, device 800. For example, in a particularembodiment, first receiving module 830 may receive, from a network node,a protected message comprising Network Steering Information, which isprotected using a configuration key (Kconf) and a MAC-1.

The determining module 840 may perform certain of the determiningfunctions of virtual computing device 800. For example, in a particularembodiment, determining module 840 may determine the Kconf from the homenetwork rook key.

The first verifying module 850 may perform certain of the verifyingfunctions of virtual computing device 800. For example, in a particularembodiment, first verifying module 850 may verify die MAC-1.

The second verifying module 860 may perform certain other of theverifying functions of virtual computing device 800. For example, in aparticular embodiment, second verifying module 860 may verify that theVPLMN did not alter Network Steering Information based on the Kconf andthe MAC-1.

The second transmitting module 870 may perform certain of thetransmitting functions of virtual computing device 800. For example, ina particular embodiment, second transmitting module 870 may transmit anacknowledgement message that is protected with a MAC-2 to the HPLMN.

Other embodiments of virtual computing device 800 may include additionalcomponents beyond those shown in FIG. 8 that may be responsible forproviding certain aspects of the UE's functionality, including any ofthe functionality described above and/or any additional functionality(including any functionality necessary to support the solutionsdescribed above). The various different types of UEs which may comprisethe transmitter may include components having the same physical hardwarebut configured (e.g., via programming) to support different radio accesstechnologies, or may represent partly or entirely different physicalcomponents.

FIG. 9 illustrates an example network node 315 for securing networksteering information, in accordance with certain embodiments. Networknode 315 may be any type of radio network node or any network node thatcommunicates with a UE and/or with another network node. Examples ofnetwork node 315 include an gNB, eNodeB, a node B, a base station, awireless access point (e.g., a Wi-Fi access point), a low power node, abase transceiver station (BTS), relay, donor node controlling relay,transmission points, transmission nodes, remote RF unit (RRU), remoteradio head (RRH), multi-standard radio (MSR) radio node such as MSR BS,nodes in distributed antenna system (DAS), O&M, OSS, SON, positioningnode (e.g., E-SMLC), MDT, or any other suitable network node. Networknodes 315 may be deployed throughout network 300 as a homogenousdeployment, heterogeneous deployment, or mixed deployment. A homogeneousdeployment may generally describe a deployment made up of the same (orsimilar) type of network nodes 315 and/or similar coverage and cellsizes and inter-site distances. A heterogeneous deployment may generallydescribe deployments using variety of types of network nodes 315 havingdifferent cell sizes, transmit powers, capacities, and inter-sitedistances. For example, a heterogeneous deployment may include aplurality of low-power nodes placed throughout a macro-cell layout.Mixed deployments may include a mix of homogenous portions andheterogeneous portions. network node 315 may include one or Ire oftransceiver 910, processing circuitry 920 (e.g., which may include oneor more processors) memory 910 and network interface 940. In someembodiments, transceiver 910 facilitates transmitting wireless signalsto and receiving wireless signals from wireless device 310 (e.g., viaantenna 950), processing circuitry 920 executes instructions to providesome or all of the functionality described above as being provided by anetwork node 315, memory 930 stores the instructions executed byprocessing circuitry 920, and network interface 940 communicates signalsto backend network components, such as a gateway, switch, router,Internet, Public Switched Telephone Network (PSTN), core network nodesor radio network controllers, etc.

Processing circuitry 920 may include any suitable combination ofhardware and software implemented in one or more modules to executeinstructions and manipulate data to perform some or all of the describedfunctions of network node 315, such as those described in relation toany of sections 3, 4, or 6 herein. For example, in general, processingcircuitry 920 may cause network node to send a paging message thatDeludes a system information notification. In certain embodiments, thesystem information notification may be sent in response to detecting achange in the risk. of an overload situation on access resources and mayindicate that the wireless device 310 is to apply a previously storedversion of system information. In some embodiments, processing circuitry920 may include, for example, one or more computers, one or more centralprocessing units (CPUs), one or more microprocessors, one or moreapplications, and/or other logic.

Memory 930 is generally operable to store instructions, such as acomputer program, software, an application including one or more oflogic, rules, algorithms, code, tables, etc. and/or other instructionscapable of being executed by a processor. Examples of memory 930 includecomputer memory (for example, Random Access Memory (RAM) or Read OnlyMemory (ROM)), mass storage media (for example, a hard disk), removablestorage media (for example, a Compact Disk (CD) or a Digital Video Disk(DVD)), and/or or any other volatile or non-volatile, non-transitorycomputer-readable and/or computer-executable memory devices that storeinformation.

In some embodiments, network interface 940 is communicatively coupled toprocessing circuitry 920 and may refer to any suitable device operableto receive input for network node 315, send output from network node315, perform suitable processing of the input or output or both,communicate to other devices, or any combination of the preceding.Network interface 940 may include appropriate hardware (e.g., port,modem, network interface card, etc.) and software, including protocolconversion and data processing capabilities, to communicate through anetwork.

Other embodiments of network node 315 may include additional componentsbeyond those shown in FIG. 9 that may be responsible for providingcertain aspects of the radio network node's functionality, including anyof the functionality described above and/or any additional functionality(including any functionality necessary to support the solutionsdescribed above). The various different types of network nodes mayinclude components having the same physical hardware but configured(e.g., via programming) to support different radio access technologies,or may represent partly entirely different physical components.

FIG. 10 illustrates an example method 1000 by a network node operatingas an authentication server function (AUSF) for securing networksteering information, according to certain embodiments. The methodbegins at step 1002 when network node 315 generates a home network rootkey.

At step 1004, the network node receives Network Steering Informationfrom a PCF.

At step 1006, the network node derives a Kconf from the home work key.

At step 1008, the network node generates a protected message comprisingthe Network Steering Information. The protected message may be protectedusing the Kconf and a (MAC-1.

At step 1010, the network node transmits the protected messagecomprising the Network Steering Information to a UE.

At step 1012, the network node receives, from the UE, an acknowledgementmessage protected with a MAC-2. The acknowledgment indicates that VPLMNdid not alter the Network Steering Information.

At step 1014, the network node verities the MAC-2.

At step 1016, the network node forwards the acknowledgment messageindicating that the VPLMN did not alter the Network SteeringInformation, to the PCF.

Certain embodiments may comprise more or fewer actions, and the actionsmay be performed in any suitable order.

In certain embodiments, the method tor securing network steeringinformation, as described above may be performed by a virtual computingdevice. FIG. 11 illustrates an example virtual computing device 900 forsecuring network steering information, according to certain embodiments.In certain embodiments, virtual computing device 1100 may includemodules for performing steps similar to those described above withregard to the method illustrated and described in FIG. 10. For example,virtual computing device 1100 may include a first generating module1110, a first receiving module 1120, a deriving module 1130, a secondgenerating module 1140, a first transmitting module 1150, a secondreceiving module 1160, a verifying module 1170, a forwarding module1180, and any other suitable modules for securing network steeringinformation. In some embodiments, one or more of the modules may beimplemented using processing circuitry 920 of FIG. 9. In certain,embodiments, the functions of two or more of the various modules may becombined into a single module.

The first generating module 1110 may perform certain of the generatingfunctions of virtual computing device 1100. For example, in a particularembodiment, first generating module 1110 may generate a home networkroot key.

The first receiving module 1120 may perform certain of the receivingfunctions of virtual computing device 1100. For example, in a particularembodiment, first receiving module 1120 may receive Network SteeringInformation from a PCT.

The deriving module 1130 may perform certain of the deriving functionsof virtual computing device 1100. For example, in a particularembodiment, deriving module 1130 may derive a Kconf from the homenetwork key.

The second generating module 1140 may perform certain of the generatingfunctions of virtual computing device 1100. For example, in a particularembodiment, generating module 1140 may generate a protected messagecomprising the Network Steering Information. The protected message maybe protected using the Kconf and a first Message Authentication Code(MAC-1).

The first transmitting module 1150 may perform certain of thetransmitting functions of virtual computing device 100. For example, ina particular embodiment, first transmitting module 1150 may transmit theprotected message comprising the Network Steering Information to a UE.

The second receiving module 960 may perform certain of the receivingfunctions of virtual computing device 1100. For example, in a particularembodiment, second receiving module 1160 may receive, from the UE, anacknowledgement message protected with a second Message AuthenticationCode (MAC-2). The acknowledgment indicates that the VPLMN did not alterthe Network Steering Information.

The verifying module 1170 may perform certain of the verifying functionsof virtual computing device 1100. For example, in a particularembodiment, verifying module 1170 may verify the MAC-2.

The forwarding module 1180 may perform certain of the forwardingfunctions of virtual computing device 1100. For example, in a particularembodiment, forwarding module 1180 may forward the acknowledgmentmessage indicating that the VPLMN did not alter the Network SteeringInformation to the PCF.

Other embodiments of virtual computing device 1100 may includeadditional components beyond those shown in FIG. 11 that may beresponsible for providing certain aspects of the network node'sfunctionality, including any of the functionality described above and/orany additional functionality (including any functionality necessary tosupport the solutions described above). The various different types ofnetwork nodes which may comprise the transmitter may include componentshaving the same physical hardware but configured (e.g.. via programming)to support different radio access technologies, or may represent partlyor entirely different physical components.

FIG. 12 illustrates an example method 1200 by a first network nodeoperating as an authentication server function (AUSF) for securingnetwork steering information, according to certain embodiments. In aparticular embodiment, the first network node may include a network nodesuch as network node 315.

At step 1202, the method begins when first network node 315 generates ahome network root key.

At step 1204, the first network node 315 receives Network SteeringInformation from a second network node. In a particular embodiment, thesecond network node may be operating as at least one of a PCF or a UDM.

At step 1206, the first network node 315 determines a Kconf from thehome network key. In a particular embodiment, the configuration key isthe home network root key. For example, the home network root key may bea Kausf, in a particular embodiment.

At step 1208, the first network node 315 generates a protected messagecomprising the Network Steering information. The protected message maybe protected using the Kconf and a MAC-1. In a particular embodiment,the protected message may be piggybacked with a Registration Acceptmessage.

At step 1210, the first network node 315 transmits the protected messagecomprising the Network Steering Information to a UE 310.

At step 1212, the first network node 315 receives, from the UE 310, anacknowledgement message protected with a MAC. The acknowledgmentindicates, that the VPLMN did not alter the Network SteeringInformation.

At step 1214, the first network node verities the MAC-2.

At step 1216, the first network node for yards the acknowledgmentMessage indicating that the VPLMN did not alter .the Network SteeringInformation to the second network node.

Certain embodiments may comprise more or fewer actions and the actionsmay be performed in any suitable order.

Certain embodiments, the method for securing network steeringinformation, .as described above may be performed by a virtual computingdevice. FIG. 13 illustrates an example virtual computing device 1300 forsecuring network steering information, according to certain embodiments.In certain embodiments, virtual computing device 1300 may includenodules for performing steps similar to those described above withregard to the method illustrated and described in FIG. 12. fur example,virtual computing device 1300 may include a first generating module1310, a first receiving module 1320, a determining module 1330, a secondgenerating module 1340, a transmitting module 1350, a second receivingmodule 1360, a forwarding module 1370, and any other suitable modulesfor securing network steering, information. In some embodiments, one ormore of the modules may be implemented using processing circuitry 920 ofFIG. 9. In certain embodiments, the functions of two or more of dievarious modules may be combined into a single module.

The first generating module 1310 may perform certain of the generatingfunctions of virtual computing device 1300. For example, in a particularembodiment, first generating module 1310 may generate a home networkroot key.

The first receiving module 1320 may perform certain of the receivingfunctions of virtual computing device 1300. For example, in a particularembodiment first receiving module 1320 may receive Network SteeringInformation from second network node.

The determining module 1330 may perform certain of the determiningfunctions of virtual computing device 1300. For example, in a particularembodiment, determining module 1330 may determine a Kconf from the homenetwork key.

The second generating module 1340 may perform certain other of thegenerating functions of virtual computing device 1300. For example. in aparticular embodiment, second generating module 1340 may generate aprotected message comprising the Network Steering Information. Theprotected message may be protected using the Kconf and a MAC-1.

The transmitting module 1350 may perform certain of the transmittingfunctions of virtual computing device 1300. For example, in a particularembodiment, transmitting module 1350 may transmit the protected messagecomprising the Network. Steering information to a UE.

The second receiving module 1360 may perform certain other of thereceiving unctions of virtual computing device 1300. For example, in ,aparticular embodiment, second receiving module 1360 may receive, from,the UE, an acknowledgement message protected with a MAC-2. Theacknowledgment indicates that the VPLMN did riot alter the NetworkSteering Information.

The forwarding module 1370 may perform certain of the forwardingfunctions of virtual computing device 1300. For example, in a particularembodiment, forwarding module 1380 may forward the acknowledgmentmessage indicating that the VPLMN did not alter the Network SteeringInformation to the second network node.

Other embodiments of virtual, computing device 1300 may includeadditional components beyond those shown in FIG. 13 that may beresponsible for providing certain aspects of the network node'sfunctionality, including any of the functionality described above and/orany additional functionality (including any functionality necessary tosupport the solutions described above). The various different types ofnetwork nodes which may comprise the transmitter may include componentshaving the same physical hardware but configured (e.g., via programming)to support different radio access technologies, or may represent partlyor entirety different physical components.

FIG. 14 illustrates an example method 1400 by a network node operatingas a PCF for securing network steering information, according to certainembodiments. The method begins at step 1402 when the network noderequests a Kconf derived from a home network root key from an AUSF.

At step 1404, the network node receives a KConf.

At step 1406, the network node generates a protected message comprisingNetwork Steering Information where the protected message is protectedusing the Kconf and a MAC-1.

At step 1408, the network node transmits the protected messagecomprising the Network Steering Information to a UE.

At step 1410, the network node receives, from the UE, an acknowledgementmessage protected with a MAC-2. The acknowledgment indicates that theVPLMN did not alter the Network Steering Information.

At step 1412, the network node verifies the MAC-2.

At step 1414, the network node determines based on the acknowledgementthat the VPLMN did not alter the Network Steering Information.

Certain embodiments may comprise more or fewer actions, and the actionstray be performed in any suitable order.

In certain embodiments, the method for securing network steeringinformation, as described above may be performed by a virtual computingdevice. FIG. 15 illustrates an example virtual computing device 1500 forsecuring network steering, information, according to certainembodiments. In certain embodiments, virtual computing device 1500 mayinclude modules for performing steps similar to those described abovewith regard to the method illustrated and described in FIG. 14. Forexample, virtual computing device 1500 may include a requesting module1510, a first receiving module 1520, a generating module 1530, atransmitting module 1540, a second receiving module 1550, a verifyingmodule 1560, a determining module 1570, and any other suitable modulesfor securing network steering information. In some embodiments, one ormore of the modules may be implemented using processing circuitry 920 ofFIG. 9. In certain embodiments, the functions of two or more of thevarious modules may be combined into a single module.

The requesting module 1510 may perform certain of the requestingfunctions of virtual computing device 1500. For example, in a particularembodiment, requesting module 1510 may request a KConf derived from ahome network root key from an a AUSF.

The first receiving module 1520 may perform certain of the receivingfunctions of virtual computing device 1500. For example, in a particularembodiment, first receiving module 1520 may receive a KConf. Thegenerating module 1530 may perform certain of the generating functionsof virtual computing device 1500. For example, in a particularembodiment generating module 1530 may generate a protected messagecomprising Network Steering Information where the protected message isprotected using the Kconf and a MAC-1.

The transmitting module 1540 may perform certain of the transmittingfunctions of virtual computing device 1500. For example, in a particularembodiment, transmitting module 1540 may transmit the protected messagecomprising the Network Steering information to UE. The second receivingmodule 1550 may perform certain of the receiving functions of virtualcomputing device 1500. For example, in a particular embodiment, secondreceiving module 1550 may receive, from the UE, art a knowledgementmessage protected with a second Message Authentication Code (MAC -2).The acknowledgment indicate that the VPLMN did not alter the NetworkSteering Information. The verifying module 1560 may perform certain ofthe verifying functions of virtual computing device 1500. For example,in a particular embodiment, verifying module 1160 may verify the MAC-2.The determining module 1570 may perform certain of the determiningfunctions of virtual computing device 1500. For example, in particularembodiment, determining module 1570 may determine, based on theacknowledgement, that the VPLMN did not alter the Network SteeringInformation. Other embodiments of virtual computing device 1500 mayinclude additional components beyond those shown in FIG. 15 that may beresponsible for providing certain aspects of the network node'sfunctionality, including any of the functionality described above and/orany additional functionality (including any functionality necessary tosupport the solutions described above). The various different types ofnetwork nodes which may comprise the transmitter may include componentshaving the same physical hardware but configured (e.g., via programming)to, support different radio access technologies, or may represent partlyor entirely different physical components.

FIG. 16 illustrates an example method 1600 for steering information by afirst network node, according to, certain embodiments in a particularembodiment, the first network node may include a network node such asnetwork node 315, described above. According to certain embodiments, thefirst network node may operate as a UDM and/or a PCF.

At step 1602, the, method begins when the first network node 315transmits Network Steering Information and a MAC-1 to a second networknode operating as an AUSF for protection of the Network SteeringInformation using a Kconf and the MAC-1. In a particular embodiment, theKconf is a home network root key such as, for example, a Kausf.

In a particular embodiment the protected message, transmitted to thesecond network node is piggybacked with a Registration Accept message.

At step 1604, the first network node 315 receives, from the UE anacknowledgement message protected with a MAC-2. The acknowledgmentindicates that the VPLMN did not alter the Network Steering Information.

At step 1606, the first network node 315 verifies the MAC-2.

At step 1608, the first network node 315 determines based on theacknowledgement that the VPLMN did not alter the Network SteeringInformation.

In a particular embodiment, the method further includes the firstnetwork node 315 receiving from the second network node operating as theAUSF, the MAC-1 and the MAC-2 and storing the MAC-2. Additionally, thefirst network node 315 may verify the MAC-2 comprises comparing thestored MAC-2 to the MAC-2 protecting the acknowledgment message from theUE. The first network node 315 may then determine that the stored MAC-2is the same was the MAC-2 protecting the acknowledgment message.

Certain embodiments may comprise more or sewer actions, and the actionsmay be performed in any suitable order.

In certain embodiments, the method for securing network steeringinformation, as described above may be performed by a virtual computingdevice. FIG. 17 illustrates an example virtual computing device 1700 forsecuring network steering information, according to certain embodiments.In certain embodiments, virtual computing device 1700 may includemodules for performing steps similar to those described above withregard to the method illustrated and described FIG. 16. For example,virtual computing device 1700 may include a transmitting module 1710, areceiving module 1720, a verifying module 1730, a determining module1740 and any other suitable modules for securing network steeringinformation. In some embodiments, one or more of the modules may beimplemented using processing circuitry 920 of FIG. 9. In certainembodiments, the functions of two or more of the various modules may becombined .into a single module.

The transmitting module 1710 may perform certain of the transmittingfunctions of virtual computing device 1700. For example, in a particularembodiment, transmitting module 1710 may transmit Network SteeringInformation and a MAC-1 to a second network node operating as a AUSF forprotection of the Network Steering information using a Kconf and the MAC-1.

The receiving module 1720 may perform certain of the receiving functionsof virtual computing device 1700. For example, in a particularembodiment, receiving module 1720 may receive, from the UE 310, anacknowledgement message protected with a MAC-2. The acknowledgmentindicates that the VPLMN did not alter the Network Steering Information.

The verifying module 1730 may perform certain of the verifying functionsof virtual computing device 1700. For example, in a particularembodiment, verifying module 1730 may verify the MAC-2.

The determining module 1740 may perform certain of the determiningfunctions of virtual computing device 1700. For example, in a particularembodiment, determining module 1740 may determine based on theacknowledgement that the VPLMN did not alter the Network SteeringInformation.

Other embodiments of virtual computing device 1700 may includeadditional components beyond those shown in FIG. 17 that may beresponsible for providing certain aspects of the network node'sfunctionality, including any of the functionality described above and/orany additional functionality (including any functionality necessary tosupport the solutions described above). The various different types ofnetwork nodes which may comprise the transmitter may include componentshaving the same physical hardware but configured (e.g., via programming)to support different radio access technologies, or may represent partlyor entirely different physical components.

FIG. 18 illustrates an example radio network controller or core networknode 1800, in accordance with certain embodiments. Examples of networknodes can include a mobile switching center (MSC), a serving GPRSsupport node (SGSN), a mobility management entity (MME), a radio networkcontroller (RNC), a base station controller (BSC), and so on. The radionetwork controller or core network node includes processing circuitry1820 (e.g., which may include one or more processors), memory 1830, andnetwork interface 1840. In some embodiments, processing circuitry 1820executes instructions to provide some or all of the functionalitydescribed above as being provided by the network node, memory 1830stores the instructions executed by processing circuitry 1820, andnetwork interface 1840 communicates signals to any suitable node, suchas a gateway, switch, router, Internet, Public Switched TelephoneNetwork (PSTN), network nodes 315, radio network controllers or corenetwork nodes, etc.

Processing circuitry 1820 may include any suitable combination ofhardware and software implemented in one or more modules to executeinstructions and manipulate data to perform some or all of the describedfunctions of the radio network controller or core network node. In someembodiments, processing circuitry 1820 may include, for example, one ormore computers, one or more central processing Units (CPUs), one or moremicroprocessors, one, or more applications, and/or other logic.

Memory 1830 is generally operable to store instructions, such as acomputer program, software, an application including one or more oflogic, rules, algorithms, code, tables, etc. and/or other instructionscapable of being executed by a processor. Examples of memory 1830include computer memory (for example, Random Access Memory (RAM) or ReadOnly Memory (ROM)), mass storage media (for example. a hard disk.),removable storage media (for example, a Compact Disk (CD) or a DigitalVideo Disk (DVD)), and/or or any other volatile or non-volatile,non-transitory computer-readable and/or computer-executable memorydevices that store information.

In some embodiments, network interface 1840 is communicatively coupledto processing circuitry 1820 and may refer to any suitable deviceoperable to receive input for the network node, send output from thenetwork node, perform suitable processing of the input or output orboth, communicate to other devices, or any combination of the preceding.Network interface 1840 may include appropriate hardware (e,g, port,modem, network interface card, etc.) and software, including protocolconversion and data processing capabilities, to communicate through anetwork.

Other embodiments of the network node may include additional componentsbeyond those shown in FIG. 18 that may be responsible for providingcertain aspects of the network node's functionality, including any ofthe functionality described above and, any additional functionality(including any functionality necessary to support the solution describedabove).

With reference to FIG. 19, in accordance with an embodiment, acommunication system includes a telecommunication network 1910, such asa 3GPP-type cellular network, which comprises an access network 1911,such as a radio access network, and a core network 1914. The accessnetwork 1911 comprises a plurality of base stations 1912 a, 19121 b,1912 c, such as NBs, eNBs, gNBs or other types of wireless accesspoints, each defining a corresponding coverage area 1913 a, 1913 b, 1913c. Each base station 1912 a, 1912 b, 1912 c is connectable to the corenetwork 1914 over a wired or wireless connection 1915. A first userequipment (UE) 1991 located in coverage area 1913 c is configured towirelessly connect to, or be paged by, the corresponding base station1912 c. A second UE 1992 in coverage area 1913 a is wirelesslyconnectable to the corresponding base station 1912 a. While a pluralityof UEs 1991, 1992 are illustrated in this example, the disclosedembodiments are equally applicable to a situation where a sole UE is inthe coverage area or where a sole UE is connecting to the correspondingbase station 1912.

The telecommunication network 1910 is itself connected to a hostcomputer 1930, which may be embodied in the hardware and/or software ofa standalone server, a cloud-implemented server, a distributed server oras processing resources in a server farm. The host computer 1930 may beunder the ownership or control of a service provider, or may be operatedby the service provider or on behalf of the service provider. Theconnections 1921, 1922 between the telecommunication network 1910 andthe host computer 1930 may extend directly from the core network 1914 tothe host computer 1930 or may go via an optional intermediate network1920. The intermediate network 1920 may be one of, or a combination ofmore than one of, a public, private or, hosted network; the intermediatenetwork 1920, if any, may be a backbone network or the Internet; inparticular, the intermediate network 1920 may comprise two or moresub-networks (not shown).

The communication system of FIG. 19 as a whole enables connectivitybetween one of the connected UEs 1991, 1992 and the host computer 1930.The connectivity may be described as an over-the-top (OTT) connection1950. The host computer 19230 and the connected UEs 1991, 1992 areconfigured to communicate data and or signaling via the OTT connection1950, using the access network 1911, the core network 1914, anyintermediate network 1920 and possible further infrastructure (notshown) as intermediaries. The OTT connection 1950 may be transparent inthe sense that the participating communication devices through which theOTT connection 1950 passes are unaware of routing of uplink and downlinkcommunications. For example, a base station 912 may not or need not beinformed about the past routing of an incoming downlink communicationwith data originating from a host computer 1930 to be forwarded (e.g.,handed over) to a connected UE 1991. Similarly, the base station 1912need not be aware of the nature routing of an outgoing uplinkcommunication originating from the UE 1991 towards the host computer1930.

Example implementations, in accordance with an embodiment, of the UE,base station and host computer discussed in the preceding paragraphswill now be described with reference to FIG. 20. In a communicationsystem 2000, a host computer 2010 comprises hardware 2015 including acommunication interface 2016 configured to set up and maintain a wiredor wireless connection with an interface of a different communicationdevice of the communication system 2000. The host computer 2010 furthercomprises processing circuitry 2018, which may have storage rid/orprocessing capabilities. In particular, the processing circuitry 2018may comprise one or more programmable processors, application-specificintegrated circuits, field programmable gate arrays or combinations ofthese (not shown) adapted to execute instructions. The host computer2010 further comprises software 2011, which is stored in or accessibleby the host computer 2010, and executable by the processing circuitry2018. The software 2011 includes a host application 2012. The hostapplication 2012 may be operable to provide a service to a remote user,such as a UE 2030 connecting via an OTT connection 2050 terminating atthe UE 2030 and the host computer 2010. In providing the service to theremote user, the host application 2012 may provide user data which istransmitted using, the OTT connection 2050.

The communication system 2000 further includes a base station 2020provided in telecommunication system and comprising hardware 2025enabling it communicate with the host computer 2010 and with the UE2030. The hardware 2025 may include a communication interface 2026 forsetting up and maintaining a wired or wireless connection with aninterface of a different communication device of the n system 2000, as wyell as a radio interface 2027 for setting up and maintaining at least awireless connection 2070 with a 2030 located in a coverage area (notshown in FIG. 20) served by the base station 2020. The communicationinterface 2026 may be configured to facilitate a connection 2060 to thehost computer 2010. The connection 2060 may be direct or it may passthrough a core network (not shown in FIG. 20) of the telecommunicationsystem and/or through one or more intermediate networks outside thetelecommunication system. In the embodiment shown, the hardware 2025 ofthe base station 2020 further includes processing circuitry 2027, whichmay comprise one or more programmable processors, application-specificintegrated circuits, field programmable gate arrays or combinations ofthese (not shown) adapted to execute instructions, The base station 2020further has software 2021 stored internally or accessible via anexternal connection.

The communication system 2000 further includes the UE 2030 alreadyreferred to. Its hardware 2035 may include a radio interface 2037configured to set up and maintain a wireless connection 2070 with a basestation serving a coverage area in which the UE 2030 is currentlylocated. The hardware 2035 of the UE 2030 further includes processingcircuitry 2038, which may comprise one or more programmable processors,application-specific integrated circuits, field programmable gate arraysor combinations of these (not shown) adapted to execute instructions.The UE 2030 further comprises software 2031, which is stored in oraccessible by the UE 2030 and executable by the processing circuitry2038. The software 2031 includes a client application 2032. The clientapplication 2032 may be operable to provide a service to a human ornon-human user via the UE 2030, with the support of the host computer2010. In the host computer 2010, an executing host application 2012 maycommunicate with the executing client application 2032 via the OTTconnection 2050 terminating at the UE 2030 and the host computer 2010.In providing the service to the user, the client application 2032 mayreceive request data from the host application 2012 and provide userdata in response to the request data. The OTT connection 2050 maytransfer both the request data and the user data. The client application2032 may interact with the user to generate the user data that itprovides,

It is noted that the host computer 2010, base station 2020 and UE 2030illustrated in FIG. 20 may be identical to the host computer 1930, oneof the base stations 1922 a, 1912 b, 1912 c and one of the UEs 1991,1992 of FIG. 19, respectively. This is to say, the inner workings ofthese entities may be as shown in FIG. 20 and independently, thesurrounding network topology may be that of FIG. 19.

In FIG. 20, the OTT connection 2050 has been drawn abstractly toillustrate the communication between the host computer 2010 and the useequipment 2030 via the base station 2020, without explicit reference toany intermediary devices and the precise routing of messages via thesedevices. Network infrastructure may determine the routing, which it maybe configured to hide from the UE 2030 or from the service provideroperating the host computer 2010, or both. While the OTT connection 2050is active, the network infrastructure may further take decisions bywhich it dynamically changes the routing (e.g, on the basis of loadbalancing consideration or reconfiguration of the network).

The wireless connection 2070 between the UE 2030 and the base station2020 is in accordance with the teachings of the embodiments describedthroughout this disclosure. One or more of the various embodimentsimprove the performance of OTT services provided to the UE 2030 usingthe OTT connection 2050, in which the wireless connection 2070 forms thelast segment. More precisely, the teachings of these embodiments mayimprove roaming by UEs and thereby provide benefits such as reduced userwaiting time and better responsiveness,

A measurement procedure may be provided for the purpose of monitoringdata rate, latency and other factors on which the one or moreembodiments improve. There may further be an optional networkfunctionality for reconfiguring the OTT connection 2050 between the hostcomputer 2010 and UE 2030, in response to variations in the measurementresults. The measurement procedure and/or the network functionality forreconfiguring the OTT connection 2050 may be implemented in the software2011 of the host computer 2010 or in the software 2031 of the UE 2030,or both. In embodiments, sensors (not shown) may be deployed in or inassociation with communication devices through which the OTT connection2050 passes; the sensors may participate in the measurement procedure bysupplying values of the monitored quantities exemplified above, orsupplying values of other physical quantities from which software 2011,2031 may compute or estimate the monitored quantities. The reconfiguringof the OTT connection 2050 may include message format, retransmissionsettings, preferred routing etc.; the reconfiguring need not affect thebase station 2020, and it may be unknown or imperceptible to the basestation 2020. Such procedures and functionalities may be known andpracticed in the art. In certain embodiments, measurements may involveproprietary UE signaling facilitating the host computer's 2010measurements of throughput, propagation times, latency and the like. Themeasurements may be implemented in that the software 2011, 2031 causesmessages to be transmitted, in particular empty or ‘dummy’ messages,using the OTT connection 2050 while it monitors propagation times,errors etc.

FIG. 21 is a flowchart illustrating a method. implemented in acommunication system, in accordance with one embodiment. Thecommunication system includes a host computer, a base station and a UEwhich may be those described with reference to FIGS. 19 and 20. Forsimplicity of the present disclosure, only drawing references to FIG. 21will be included in this section. In a first step 2110 of the method,the host computer provides user data. In an optional subsets 2111 of thefirst step 2110, the host computer provides the user data by executing ahost application. In a second step 2120, the host computer initiates atransmission carrying the user data to the UE. In an optional third step2130, the base station transmits to the UE the user data which wascarried in the transmission that the host computer initiated, in,accordance with the teachings of the embodiments described throughoutthis disclosure. In an optional fourth step 2140, the UE executes aclient application associated with the host application executed by thehost computer.

FIG. 22 is a flowchart illustrating a method implemented in acommunication system, in accordance with one embodiment. Thecommunication system includes a host computer, a base station and a UEwhich may be those described with reference to FIGS. 19 and 20. Forsimplicity of the present disclosure, only drawing references to FIG. 22will be included in this section. In a first step 2210 of the method,the host computer provides user data. In an optional substep (not shown)the host computer provides the user data by executing a hostapplication. In a second step 2220, the host computer initiates atransmission carrying the user data to the UE. The transmission may passvia the base station, in accordance with the teachings of theembodiments described throughout this disclosure. In an optional thirdstep 2230, the UE receives the user data carried in the transmission.

FIG. 23 is a flowchart illustrating a method implemented in acommunication system, in accordance with one embodiment. Thecommunication system includes a host computer, a base station and a UEwhich may be those described with reference to FIGS. 19 and 20. Forsimplicity of the present disclosure, only drawing references to FIG. 23will he included in this section. In an optional first step 2310 of themethod, the UE receives input data provided by the host'computer.Additionally or alternatively, in an optional second step 2320, the UEprovides user data. In an optional substep 2321 of the second step 2320,the UE provides the user data by executing a client application. In afurther optional substep 2311 of the first step 2310, the UE executes aclient application which provides the user data in reaction to thereceived input data provided by the host computer. in providing the userdata, the executed client application may further consider user inputreceived from the user. Regardless of the specific manner in which theuser data was provided, the UE initiates, in an optional third substep2330, transmission of the user data to the host computer. In a fourthstep 2340 of the method, the host computer receives the user datatransmitted from the UE, in accordance with the teachings of theembodiments described throughout this disclosure.

FIG. 24 is a flowchart illustrating a method implemented in acommunication system, in accordance with one embodiment. Thecommunication system includes a host computer, a base station and a UEwhich may be those described with reference to FIGS. 19 and 20. Forsimplicity of the present disclosure, only drawing references to FIG. 24will be included in this section. In an optional first step 2410 of themethod, in accordance with the teachings of the embodiments describedthroughout this disclosure, the base station receives user data from theUE. In an optional second step 2420, the base station initiatestransmission of the received user data to the host computer. In a thirdstep 2430, the host computer receives the user data carried in thetransmission initiated by the base station.

Example Embodiments

1. A method by a wireless device for securing network steeringinformation, comprises:

transmitting a registration request to a Visited Public Land MobileNetwork (VPLMN);

upon successful authentication by an authentication server function(AUSF), generating a home network root key;

receiving from a network node, a protected message comprising NetworkSteering Information, which is protected using a configuration key(Kconf) derived from the home network root key and a first MessageAuthentication Code (MAC-1);

deriving the configuration key (Kconf) from the home network rook key;

verifying, by the UP, the MAC-1;

based on the Kconf and the MAC-1, verifying that the VPLMN did not alterNetwork Steering Information; and

transmitting an acknowledgement message to a Home Public Land MobileNetwork (HPLMN), the acknowledgement message protected with a secondMessage Authentication Code (MAC-2).

2. The method of example embodiment 1, wherein the home network root keyis a Kausf.3. The method of example embodiments 1 to 2, wherein the network nodecomprises the AUSF.4. The method of example embodiments 1 to 3, wherein the NetworkSteering Information is generated by another network node and protectedby the AUSF.5. The method of any of example embodiment 4, wherein the NetworkSteering Information is generated by User Data Management (UDM).6. The method of any of example embodiments 1 to 2, wherein the networknode comprises a Point Coordination Function (PCF) responsible forprotecting the Network Steering Information in the protected message.7. The method of any of example embodiments 1 to 2, wherein the networknode comprises an Access Mobility Function/Security Anchor Function(AMF/SEAF), which forwarded the protected message comprising the NetworkSteering information from another network node.8. The method of example embodiment 7, wherein the protected message isconfidentiality protected over the air with Non Access Stratum (NAS)security.9. The method of any, of example embodiments 1 to 8, wherein theprotected message is piggybacked with a Registration Accept message.10. A user equipment comprising memory operable to store instructionsand processing circuitry operable to execute the instructions, wherebythe network node is operable to perform any of the methods of exampleembodiments 1 to 9.11. A computer program product comprising a non-transitory computerreadable medium storing computer readable program code. the computerreadable program code comprises program code for performing any of themethods of example embodiments 1 to 9.12. A method for securing network steering information by a network nodeoperating as an authentication server function (AUSF), the methodcomprises:

generating a home network root key;

receiving Network Steering Information from a Point Coordinationfunction (PCF);

deriving a configuration key (Kconf) from the home network key;

generating a protected message comprising the Network SteeringInformation, the protected message being protected using the Kconf and afirst Message Authentication Code (M AC-1);

transmitting the protected message comprising the Network SteeringInformation to a user equipment (UE);

receiving, from the UE, an acknowledgement message protected with asecond Message Authentication Code (MAC-2), the acknowledgmentindicating that the VPLMN did not alter the Network SteeringInformation;

verifying the MAC-2; and

forwarding the acknowledgment message indicating that the VPLMN did notalter the Network Steering Information to the PCF.

13. The method n embodiment 12, wherein the home network root key is aKausf.14. The method of embodiments 12 to 13, wherein the protected message ispiggybacked with a Registration Accept message.15. A network node comprising memory operable to store instructions andprocessing circuitry operable to execute the instructions, whereby thenetwork node is operable to perform any of the methods of exampleembodiments 12 to 14.16. A computer program product comprising a non-transitory computerreadable medium storing computer readable program code, the computerreadable program code comprises program code for performing any of themethods of example embodiments 12 to 14.17. A method for securing network steering information by a network nodeoperating as a Point Coordination Function (PCF), the method comprising:

requesting, from a Authentication Server Function (ASF), a configurationkey (KConf) derived from a home network root key;

receiving the KConf;

generating a protected message comprising Network Steering Information,the protected message being protected using the Kconf and a firstMessage Authentication Code MAC-1);

transmitting the protected message comprising the Network SteeringInformation to a user equipment (UE);

receiving, from the UE, an acknowledgement message protected with asecond Message Authentication Code (MAC-2), the acknowledgmentindicating that the VPLMN did not alter the Network SteeringInformation:

verifying the MAC-2; and

determining based on the acknowledgement that the VPLMN did not alterthe Network Steering Information.

18. The method of embodiment 17, wherein the home network root key is aKausf.19. The method of embodiments 17 to 18, wherein the protected message ispiggybacked with a Registration Accept message.20. A network node comprising memory operable to store instructions andprocessing circuitry operable to execute the instructions, whereby thenetwork node is operable to perform any of the methods of exampleembodiments 17 to 19.21. A computer program product comprising a non-transitory computerreadable medium storing computer readable program code, the computerreadable program code comprises program code for performing any of themethods of example embodiments 17 to 19.22. A base station configured to communicate with a user equipment (UE),the base station comprising a radio interface and processing circuitryconfigured to perform any of the methods of example embodiments 17 to19.

Modifications, additions, or omissions may be made to the systems andapparatuses described herein without departing from the scope of thedisclosure. The components of the systems and apparatuses may beintegrated or separated. Moreover, the operations of the systems andapparatuses may be performed by more, fewer, or other components.Additionally, operations of the systems and apparatuses may be performedusing any suitable logic comprising software, hardware, and/or otherlogic, As used in this document, “each” refers to each member of a setor each member of a subset of as set.

Modifications, additions, or omissions may be made to the methodsdescribed herein without departing from the scope of the disclosure. Themethods may include more, fewer, or other steps, Additionally, steps maybe performed in any suitable order.

Although this disclosure has been described in terms of certainembodiments, alterations and permutations of the embodiments will beapparent to those skilled in the art. Accordingly, the above descriptionof the embodiments does not constrain this disclosure. Other changes,substitutions, and alterations are possible without departing from thespirit and scope of this disclosure.

Abbreviations

Abbreviation Explanation 3GPP 3^(rd) Generation Partnership Project 5G5^(th) Generation BER Bit Error Rate C-MTC Critical MTC (Ako referred toas Ultra Reliable and Low Latency Communication (URLLC).) CP CyclicPrefix DMRS Demodulation Reference Signal eNB Evolved NodeB gNB The termfor a radio base station in NR (corresponding to eNB in LTE) IDIdentity/Identifier IE Information Element IM Index Modulation LTE LongTerm Evolution MIB Master Information Block MIMO Multiple-InputMultiple-Output ML Maximum Likelihood Detection MSG Message M-MTCMassive MTC MTC Machine Type Communication NGC Next Generation Core NRNew Radio (The term used for the 5G radio interface and radio accessnetwork in the technical reports and standard specifications 3GPP areworking on.) OFDM Orthogonal Frequency Division Multiple Access PBCHPhysical Broadcast Channel PCI Physical Cell Identity PDCCH PhysicalDownlink Control Channel PDSCH Physical Downlink Shared Channel PLMNPublic Land Mobile Network PRACH Physical Random Access Channel PSSPrimary Synchronization Signal QAM Quadrature Amplitude Modulation QCLQuasi-Co-Located RA Random Access RAN Random Access Network RAR RandomAccess Response RMSI Remaining Minimum System Information RRC RadioResource Control SFN Single Frequency Network SI System Information SIBSystem Information Block SM Spatial Modulation SNR Signal to Noise RatioSS Synchronization Signal SSS Secondary Synchronization Signal TRPTransmission/Reception Point UE User Equipment UL Uplink

1.-44. (canceled)
 45. A method performed by a user equipment (UE) for securing network steering information, comprises: transmitting a registration request to a Visited Public Land Mobile Network (VPLMN); upon successful primary authentication, generating a home network root key; receiving, from a first network node, a protected message comprising Network Steering Information, which is protected using the home network root key and a first Message Authentication Code (MAC-1); based on the home network root key and a verified MAC-1, determining that the VPLMN did not alter Network Steering information; and transmitting an acknowledgement message to a Home Public Land Mobile Network (HPLMN), the acknowledgement message is transmitted with a second Message Authentication Code (MAC -2).
 46. The method off claim 45, wherein the home network root key is a Kausf and the first network node comprises the AUSF.
 47. The method of claim 45, wherein the Network Steering Information is generated by a second network node and protected by the AUSF.
 48. The method of claim 45, wherein the Network Steering Information is generated by User Data Management (UDM).
 49. The method of claim 45, wherein the protected message is piggybacked with Registration Accept message.
 50. A user equipment (UE) comprising: memory operable to store instructions; and processing circuitry operable to execute the instructions to cause the to: transmit a registration request to a Visited Public Land Mobile Network (VPLMN); upon successful primary authentication, generate a home network root key; receive, from a first network node, a protected message comprising Network Steering Information, which is protected using the home network root key and a first Message Authentication Code (MAC-1); based on the home network root key and a verified MAC-1, determine that the VPLMN did not alter Network Steering Information; and transmit an acknowledgement message to a Home Public Land Mobile Network (HPLMN), the acknowledgement message is transmitted with a second Message Authentication Code (MAC-2).
 51. The UE of claim 50, wherein the home network root key is a Kausf, and the first network node comprises the AUSF.
 52. The UE of claim 50, wherein the Network Steering Information is generated by a second network node and protected by the AUSF.
 53. The UE of claim 52, wherein the Network Steering Information is generated by User Data Management (UDM).
 54. The UP of claim 50, wherein the protected message is piggybacked with a Registration Accept message.
 55. A method for securing network steering information by a first network node operating as an authentication server function (AUSF), the method comprises: generating a home network root key; receiving Network Steering Information from a second network node; generating a protected message comprising the Network Steering Information, the protected message being protected using the home network root key and a first Message Authentication Code (MAC-1); transmitting the protected message comprising the Network Steering Information to a user equipment (UE); receiving, from the UE, an acknowledgement message protected with a second Message Authentication Code (MAC-2), the acknowledgment indicating that the VPLMN did not alter the Network Steering Information; and forwarding the acknowledgment message indicating that the VPLMN did not alter the Network Steering Information to the second network node.
 56. The method of claim 5, wherein the home network root key is a Kausf and the protected message is piggybacked with a Registration Accept message,)
 57. The method of claim 55, wherein the second network node is operating as at least one of a Point Coordination Function (PCF) or a User data Management (UDM).
 58. A first network node operating as an authentication server function (AUSF) for securing network steering information, the network node comprising: memory operable to store instructions; and processing circuitry operable to execute the instructions to cause the network node to: generate a home network root key; receive Network Steering Information from a second network node; generate a protected message comprising the Network Steering Information, the protected message being protected using the home network root key and a first Message Authentication Code (MAC-1); transmit the protected message comprising the Network Steering Information to a user equipment (UE); receive, from the UE, an acknowledgement message protected with a second Message Authentication Code (MAC-2), the acknowledgment indicating that the VPLMN did not alter the Network Steering information; and forward the acknowledgment message indicating that the VPLMN did not alter the Network Steering Information to the second network node.
 59. The first network node of claim 58, wherein the home network root key is a Kausf.
 60. The first network node of claim 58 wherein the protected message is piggybacked with a Registration Accept message.
 61. The first network node of claim 58, the second network node is operating as at least one of a Point Coordination Function (PCF) or a User data Management (UDM).
 62. A method for securing network steering information by a first network node, the method comprising: transmitting Network Steering information and a first Message Altercation Code (MAC-1) to a second network node operating as an authentication server Emotion (AUSF) for protection of the Network Steering information using a home network root key and the first Message Authentication Code (MAC-1); receiving, from the UE, an acknowledgement message protected with a second Message Authentication Code (MAC-2), the acknowledgment indicating that the VPLMN did not alter the Network Steering information: verifying the second MAC-2; and determining based on the acknowledgement that the VPLMN did not alter the Network Steering Information.
 63. The method of claim 62, wherein the home network root key is a Kausf.
 64. The method of claim 62, wherein the first network node operates as a User Data Management (UDM) or a Point Coordination Function (PCF).
 65. The method of claim 62, further comprising: receiving from the second network node operating as the AUSF, the first MAC-1 and a third MAC-2; storing the third MAC-2.
 66. The method of claim 65, where in: verifying the second MAC-2 comprises comparing the third MAC-2 to the second MAC-2 protecting the acknowledgment message from the UE, and determining based on the acknowledgement that the VPLMN did not alter the Network Steering information comprises determining that the third MAC-2 is the same as the second MAC-2 protecting the acknowledgment message.
 67. A first network node for securing network steering information, the network node comprising: memory operable to store instructions; and processing circuitry operable to execute the instructions to cause the network node to: transmit Network Steering Information and a first Message Altercation Code (MAC-1) to a second network node operating as an authentication server function (AUSF) for protection of the Network Steering information using a home network root key and the first Message Authentication Code (MAC-1); receive, from the UE, an acknowledgement message protected with a second Message Authentication Code (MAC-2), the acknowledgment indicating that the VPLMN did not alter the Network Steering Information; verify the second MAC-2; and determine based on the acknowledgement that the VPLMN did not alter the Network Steering Information.
 68. The first network node of claim 67, wherein the home network root key is a Kausf.
 69. The first network node of claim 67, wherein the first network node operates. as a User Data Management (UDM) or a Point Coordination Function (PCF).
 70. The first network node of claim 67, wherein the processing circuitry is configured to: receive from the second network node operating as to AUSF, the first MAC-1 and a third MAC-2; store the third MAC-2.
 71. The first network node of claim 70, wherein: verifying the second MAC-2 comprises comparing the third MAC-2 to the second MAC-2 protecting the acknowledgment message from the UE, and determining based on the acknowledgement that the VPLMN did not alter the Network Steering Information comprises determining that the third MAC-2 is the same as the second MAC-2 protecting the acknowledgment message. 