Method of enabling slice security separation
11134103 · 2021-09-28
Assignee
Inventors
- Andreas Kunz (Heidelberg, DE)
- Anand Raghawa Prasad (Tokyo, JP)
- Naoaki Suzuki (Tokyo, JP)
- Hironori Ito (Tokyo, JP)
Cpc classification
H04W60/00
ELECTRICITY
H04L63/20
ELECTRICITY
H04W4/70
ELECTRICITY
H04W76/27
ELECTRICITY
International classification
H04W60/00
ELECTRICITY
H04W76/27
ELECTRICITY
Abstract
A mobile network system comprises a security device and a network device. The security device stores slice security requirements which are different for each slice ID (identification). The slice ID indicates a network slice in a core network. The network device transmits, to the security device, a Slice Security Request including the slice ID. The network device receives, from the security device, a Slice Security Response including the slice security requirements related to the slice ID. The network device selects, based on the slice security requirements, a security algorithm for the network slice.
Claims
1. A network node used in a mobile network comprising: a transmitter to transmit, to a security server used in the mobile network, a Slice Security Request including a slice ID provided by user equipment, the slice ID indicating a network slice in a core network; a receiver to receive, from the security server, a Slice Security Response including slice security requirements related to the slice ID; and a processor to create, based on the slice security requirements, an Authentication Vector per slice ID, wherein the transmitter transmits, to a control plane node used in the mobile network and to perform authentication and key agreement for user equipment, said Authentication Vector for selecting a security algorithm for integrity and ciphering per slice ID.
2. A mobile network system comprising: a security server comprising a memory to store slice security requirements which are different for each slice ID indicating each network slice in a core network; and a network device node comprising a transmitter to transmit, to the security server, a Slice Security Request including a slice ID provided by user equipment, and to receive, from the security node, a Slice Security Response including the slice security requirements related to the slice ID, and a processor to create, based on the slice security requirements, an Authentication Vector per slice ID; and a control plane node comprising a processor to perform authentication and key agreement for user equipment wherein the network node transmits, to the control plane node, said Authentication Vector, and wherein the control plane node selects a security algorithm for integrity and ciphering per slice ID based on said Authentication Vector.
3. A security separation method for a network node used in a mobile network, the method comprising: transmitting, to a security server used in the mobile network, a Slice Security Request including a slice ID provided by user equipment, the slice ID indicating a network slice in a core network; receiving, from the security server, a Slice Security Response including slice security requirements related to the slice ID; creating, based on the slice security requirements, an Authentication Vector per slice ID; and transmitting, to a control plane node used in the mobile network and to perform authentication and key agreement for user equipment, said Authentication Vector for selecting a security algorithm for integrity and ciphering per slice ID.
4. A security separation method for a mobile network system including a security server a network node and a control plane node, the method comprising: storing, by the security server, slice security requirements which are different for each slice ID, indicating each network slice in a core network; transmitting, by the network node, a Slice Security Request including a slice ID provided by user equipment to the security server; receiving, by the network node, a Slice Security Response including the slice security requirements related to the slice ID from the security server; creating, by the network node, based on the slice security requirements, an Authentication Vector per slice ID; transmitting, by the network node, to the control plane node, said Authentication Vector; and selecting, by the control plane node, a security algorithm for integrity and ciphering per slice ID based on said Authentication Vector.
Description
BRIEF DESCRIPTION OF DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
DESCRIPTION OF EMBODIMENTS
(9) Each solution is described in a general way and in a more specific embodiment to as an example how to apply the invention to a 3GPP network. Even if the described solution is foreseen to be used in a 3GPP mobile network, using GSM, GPRS, UMTS, HSPA, LTE, LTE-A access, but it is not limited to such a network and could be used in the same way for any other cellular or mobile network, e.g. CDM2000, Bluetooth, IEEE 802.11 variants, ZigBee etc., i.e. any access technologies and core network technologies. The described protocol options are considered to be DIAMETER, GTP, MAP, SIP, but could be any other as well like HTTP, XCAP, RADIUS etc. The new Slice Security Server can be a separate entity but can be also collocated with any other entity e.g. the MME, HSS, SGW, SGSN, GGSN, SCEF, MTC-IWF, PGW, Network Management System or the Slice Manager, etc.
(10)
(11) For a 3GPP system, the used basic terminology may map in the following way:
(12) Radio Access Entity (RAE)=eNB/NodeB
(13) Control Plane Entity (CPE)=MME/SGSN
(14) User Plane Entity (UPE)=SGW/PGW/SGSN/GGSN
(15) Slice Security Server (SSS)=HSS/AuC
(16) 3rd Party Service Provider (3PSP)=SCS/AS
(17) As a prerequisite, the 3PSP needs to provide a detailed enough slice description including corresponding security requirements to the network. There are two options possible for the configuration: 1) on a per subscription basis 2) on a per 3PSP basis
(18) Option 1) requires that the network is able to resolve the subscriptions that are affected with the request from the 3PSP. This could be done e.g. with a former binding in the network in the subscription information with the 3PSP or service ID. The network would be required to update the subscription information for this service ID/3PSP every time the 3PSP provides changes or updates.
(19) Option 2) requires that the network only keeps 3PSP or service ID related information and performs at a later stage whether a terminal is affected or not. An example call flow is shown in
(20) The security requirements sent by the 3PSP may be on a very high level, e.g. low security, medium, high security, or more detailed, indicating special procedures and or algorithms, e.g. MILENAGE, KASUMI; UEA2, UIA2, EEA3, EIA3, TUAK, GEA3, GEA4, GIA4, GEA4, GIA5 etc. . . . The security requirements could also represent a pointer to a predefined security profile that was acknowledged beforehand with the 3PSP and the network and the 3PSP is able to choose between different profiles.
(21) This configuration exchange is done via the SCEF as shown in
(22) Acknowledgements are not shown in this call flow, the slice creation and assignment of the slice ID is performed in advance to this flow.
(23) Instead of provisioning the slice security requirements from the 3PSP to the SSS it is also possible to preconfigure them e.g. with OAM procedures or manually in the SSS, but this may be less dynamic from 3PSP point of view.
(24) As another prerequisite the UE must be preconfigured with the slice IDs to be used and those must match to the ones configured in the network. This configuration may be done with a special configuration server in the operator network using XCAP, OMA DM etc., or via the 3PSP directly over the top. In case of a configuration server in the operator network, the 3PSP must provide the configuration and the affected TEs to the mobile operator, preferably via the SCEF. The configuration server may be the Slice Manager, who resolves the affected UEs and updates their configuration as well as the corresponding subscription profiles.
(25)
(26) The solution of the above described problem may be achieved in two different ways, depending on the implementation of the RRC protocol: Solution 1: One RRC connection for all slices Solution 2: One RRC connection per slice
In the following only solution 1 is shown in details in the following, solution 2 would simply require repeating all messages per slice.
Solution 1: One RRC Connection for all Slices
(27)
(28) If a UE would like to attach to a slice not included in the ATTACH request of step 1, then the UE would be required to send another ATTACH request with the slice ID it would like to be attached to. The CPE detects that the UE is already attached to the network and would not perform a challenge-response with the UE, but still query the SSS for the security requirements of the slice. This is not possible if the service choice is done by the network, since the UE would not include any slice ID.
(29) In another embodiment, the HSS may ask the 3PSP directly, or via SSS, or via SCEF or both for the security requirements on a per UE basis, i.e. the 3PSP does not need to preprovision the SSS with security requirements but signaling traffic may be increased.
(30) Solution 2: One RRC Connection Per Slice
(31) In case the one RRC connection per slice is used, i.e. the UE would setup a separate radio signaling bearer for each slice independently. As a consequence the UE would send separate Attach requests for each slice. As a result authentication and control plane as well as radio access security is setup separately as well as the NAS signaling per slice. Each slice could be considered as a Virtual Machine inside the UE, acting completely independently to the other slices.
(32) Summary
(33) Beneficially, the above described exemplary embodiments include, although they are not limited to, one or more of the following functionalities.
(34) 1) New SSS Functionality:
(35) a. SSS stores security requirements from the 3PSP for a particular service/slice. b. SSS creates a binding between the security requirements and the service/slice IDs c. SSS gets queried from the HSS to lookup the security requirements for requested slice/service IDs d. For unknown slice/service IDs, the SSS can derive or lookup the 3PSP address and query the corresponding security requirements, e.g. via SCEF
2) New UE Functionality: a. UE includes either slice capabilities (service selection done by network) or slice/service IDs in the Attach request (service selection done by UE). b. UE uses either a single RRC/NAS connection for all slices or one RRC/NAS connection per slice.
3) New CPE/HSS Functionality: a. HSS selects security algorithms and authentication vectors per slice and for the NAS/RRC connection if shared by multiple slices b. HSS validates slice/service request based on subscription information c. HSS, CPE and RAE may use preconfigured security profiles instead of full authentication vectors.
(36) It can be seen that the above embodiments describe a method for slice security separation comprising: 1) UE Provisioning of Slice Security requirements from the 3PSP to the SSS; 2) During the provisioning, SECF translates a slice description to Slice Security requirements per subscription or 3PSP basis/service ID; 3) Indicating at time of ATTACH the requested slice IDs/service IDs by the UE (or the subscribed slice IDs/service IDs by the HSS); 4) Request of Slice Security requirements for each slice from the SSS; 5) Based on given Slice Security requirements per slice, HSS provides an authentication vector or an security profile per slice; 6) Selection of algorithms for integrity and ciphering and procedures based on Slice Security requirements; and 7) Provisioning of security parameters sets per slice for control plane and radio access layer.
Benefits
(37) It can be seen that the above embodiments provide a number of benefits, including, but not limited to the possibility to provide different security modes per slice associated with a single terminal.
(38) System Overview
(39)
(40) In this network 4, network slicing is provided as described above. Moreover, the network 4 beneficially allows slice security separation to provide support for different security requirements associated with different services.
(41) As can be seen, the network includes an access node 5, a user plane node 6, a control plane node 7, a slice manager 8, a slice security server (SSS) 9, a service capability exposure function (SCEF) 10, amongst others. Various services may be provided using one or more application servers 15.
(42) User Equipment
(43)
(44) The controller 37 controls overall operation of the UE 3 by, in this example, program instructions or software instructions stored within memory 39. As shown, these software instructions include, among other things, an operating system 41, a communications control module 43, a security module 45, a NAS module 47, and an RRC module 49.
(45) The communications control module 43 controls the communication between the UE 3 and the base station/access node 5. The communications control module 43 also controls the separate flows of control data (Control Plane) and user data (User Plane, both uplink and downlink) that are to be transmitted to the base station/access node 5 and other nodes (via the base station/access node) such as the control plane node 7 and/or the 3PSP 15.
(46) The security module 45 is responsible for applying one or more set of appropriate security algorithms, procedures and/or settings corresponding to security requirements associated with the various network slices (e.g. per service).
(47) The NAS module 47 is operable to generate, send and receive signalling messages formatted according to the NAS protocol. The NAS messages may include, for example, the NAS messages comprising control data relating to mobility of the UE 3, e.g. control data for attaching the UE 3 to the network and/or for setting up security for the UE 3 (per slice, if appropriate).
(48) The RRC module 49 is operable to generate, send and receive signalling messages formatted according to the RRC standard. The RRC messages may include, for example, messages relating to the random access procedure and/or the RRC connection establishment/reconfiguration, UE configuration, and the RRC messages may also include messages comprising control data (e.g. NAS messages) to be relayed by the serving base station access node 5 to other network nodes.
(49) Slice Manager
(50)
(51) Software may be pre-installed in the memory 59 and/or may be downloaded via the communication network 1 or from a removable data storage device (RMD), for example. The controller 57 is configured to control the overall operation of the slice manager 8 by, in this example, program instructions or software instructions stored within memory 59. As shown, these software instructions include, among other things, an operating system 61, a communications control module 63, and a security module 65.
(52) The communications control module 63 controls the communication between the slice manager 8 and other network entities that are connected to the slice manager 8 (e.g. the base station/access node 5, the control plane node 6, the HSS, the SSS 9, and the UE 3 when connected to the base station/access node 5).
(53) The security module 65 is responsible for applying one or more set of appropriate security algorithms, procedures and/or settings corresponding to security requirements associated with the various network slices (e.g. per service).
(54) Slice Security Server
(55)
(56) Software may be pre-installed in the memory 79 and/or may be downloaded via the communication network 1 or from a removable data storage device (RMD), for example. The controller 77 is configured to control the overall operation of the slice security server 9 by, in this example, program instructions or software instructions stored within memory 79. As shown, these software instructions include, among other things, an operating system 81, a communications control module 83, and a security module 85.
(57) The communications control module 83 controls the communication between the slice security server 9 and other network entities that are connected to slice security server 9 (e.g. the base station/access node 5, the control plane node 6, the HSS, the slice manager 8, and the UE 3 when connected to the base station/access node 5).
(58) The security module 85 is responsible for applying one or more set of appropriate security algorithms, procedures and/or settings corresponding to security requirements associated with the various network slices (e.g. per service).
(59) Modifications and Alternatives
(60) Detailed embodiments have been described above. As those skilled in the art will appreciate, a number of modifications and alternatives can be made to the above embodiments whilst still benefiting from the inventions embodied therein. By way of illustration only a number of these alternatives and modifications will now be described.
(61) In the above description, the UE, the slice manager, and the slice security server are described for ease of understanding as having a number of discrete modules (such as the communications control modules and the security modules). Whilst these modules may be provided in this way for certain applications, for example where an existing system has been modified to implement the invention, in other applications, for example in systems designed with the inventive features in mind from the outset, these modules may be built into the overall operating system or code and so these modules may not be discernible as discrete entities. These modules may also be implemented in software, hardware, firmware or a mix of these.
(62) In the above embodiments, a number of software modules were described. As those skilled in the art will appreciate, the software modules may be provided in compiled or un-compiled form and may be supplied to the UE, the slice manager, and the slice security server as a signal over a computer network, or on a recording medium. Further, the functionality performed by part or all of this software may be performed using one or more dedicated hardware circuits. However, the use of software modules is preferred as it facilitates the updating of the UE, the slice manager, and the slice security server in order to update their functionalities.
(63) Various other modifications will be apparent to those skilled in the art and will not be described in further detail here.
LIST OF ABBREVIATIONS
(64) TABLE-US-00001 TABLE 1 3PSP 3rd Party Service Provider API Application Programming Interface AS Application Server AuC Authentication Center CPE Control Plane Entity eNB Evolved NodeB GGSN Gateway GPRS Support Node GPRS General Packet Radio Service HLR Home Location Register HO Handover HSS Home Subscriber Server IMSI International Mobile Subscriber Identifier IP Internet Protocol IWF Interworking Function LAI Location Area Identifier LAU Location Area Update LTE Long Term Evolution MGW Media Gateway MME Mobility Management Entity MSC Mobile Switching Centre MSC-S MSC-Server MTC Machine Type Communication NAS Non Access Stratum NW Network PCEF Policy Control Enforcement Function PCRF Policy Control Rule Function PDN Packet Data Network PGW PDN Gateway PLMN Public Land Mobile Network QoS Quality of Service RAE Radio Access Entity RRC Radio Resource Control SCEF Service Capability Exposure Function SCS Service Capability Server SGSN Serving GPRS Support Node SGW Serving Gateway SP Service Provider SSS Slice Security Server UE User Equipment UPE User Plane Entity URI Uniform Resource Identifier
LIST OF REFERENCES
(65) [1] 3GPP TS 23.401 “General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access”, v13.6.0, 2016 Mar. 15 [2] 3GPP TS 24.301 “Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3”, v 13.5.0, 2016 Mar. 18 [3] 3GPP TS 33.401 “3GPP System Architecture Evolution (SAE); Security architecture”, v 13.2.0, 2016 Mar. 17 [4] 3GPP TR 23.799 “Study on Architecture for Next Generation System”, v0.2.0, 2016 Feb. 10 [5] 3GPP TR 22.891 “Study on New Services and Markets Technology Enablers”, v14.0.0, 2016 Mar. 18
(66) Various other modifications will be apparent to those skilled in the art and will not be described in further detail here.
(67) (Supplementary Note 1) A security device used in a mobile network comprising: a memory to store slice security requirements which are different for each slice ID, the slice ID indicating a network slice in a core network; and a transmitter to transmit the slice security requirements to a network device used in the mobile network in response to a request for selecting a security algorithm for the network slice.
(68) (Supplementary Note 2) A network device used in the mobile network comprising: a transmitter to transmit, to a security device used in the mobile network, a Slice Security Request including a slice ID which indicates a network slice in a core network; a receiver to receive, from the security device, a Slice Security Response including slice security requirements related to the slice ID; and a controller to select, based on the slice security requirements, a security algorithm for the network slice.
(69) (Supplementary Note 3) The network device according to the supplementary note 2, further comprising: a processor to create an Authentication Vector based on the slice security requirements.
(70) (Supplementary Note 4) A mobile network system comprising: a security device; and a network device; wherein the security device is configured to store slice security requirements which are different for each slice ID, the slice ID indicating a network slice in a core network, and the network device is configured to transmit, to the security device, a Slice Security Request including the slice ID, to receive, from the security device, a Slice Security Response including the slice security requirements related to the slice ID, and to select, based on the slice security requirements, a security algorithm for the network slice.
(71) (Supplementary Note 5) The mobile network system according to the supplementary note 4, wherein the network device creates an Authentication Vector based on the slice security requirements.
(72) (Supplementary Note 6) A security separation method for a security device used in a mobile network, the method comprising: storing slice security requirements which are different for each slice ID, the slice ID indicating a network slice in a core network; and transmitting, to a network device used in the mobile network, the slice security requirements in response to a request for selecting a security algorithm for the network slice.
(73) (Supplementary Note 7) A security separation method for a network device used in the mobile network, the method comprising: transmitting, to a security device used in the mobile network, a Slice Security Request including a slice ID which indicates a network slice in a core network; receiving, from the security device, a Slice Security Response including slice security requirements related to the slice ID; and selecting, based on the slice security requirements, a security algorithm for the network slice.
(74) (Supplementary Note 8) A security separation method for a mobile network system including a security device and a network device, the method comprising: storing, by the security device, slice security requirements which are different for each slice ID, the slice ID indicating a network slice in a core network; transmitting, by the network device, a Slice Security Request including the slice ID to the security device; receiving, by the network device, a Slice Security Response including the slice security requirements related to the slice ID from the security device; and selecting, by the network device, based on the slice security requirements, a security algorithm for the network slice.
(75) (Supplementary Note 9) An authentication method for a mobile network system including a security device as part of a network device, the method comprising: storing slice security requirements which are different for each slice ID, the slice ID indicating a network slice in a core network; and selecting, based on the slice security requirements, a security algorithm for the network slice.
(76) (Supplementary Note 10) The authentication method according to the supplementary note 9, further comprising: creating an Authentication Vector based on the slice security requirements.
(77) (Supplementary Note 11) A non-transitory computer-readable recording medium storing therein a program to cause a computer to execute the processing comprising: storing slice security requirements which are different for each slice ID, the slice ID indicating a network slice in a core network; and transmitting, to a network device used in the mobile network, the slice security requirements in response to a request for selecting a security algorithm for the network slice.
(78) (Supplementary Note 12) A non-transitory computer-readable recording medium storing therein a program to cause a computer to execute the processing comprising: transmitting, to a security device used in the mobile network, a Slice Security Request including a slice ID which indicates a network slice in a core network; receiving, from the security device, a Slice Security Response including slice security requirements related to the slice ID; and selecting, based on the slice security requirements, a security algorithm for the network slice.
(79) This application is based upon and claims the benefit of priority from European Patent Application No. EP16275069.9, filed on Apr. 29, 2016, the disclosure of which is incorporated herein in its entirety by reference.