Method and arrangement in a telecommunication system
11075749 · 2021-07-27
Assignee
Inventors
Cpc classification
H04L9/083
ELECTRICITY
H04L63/062
ELECTRICITY
H04L9/0816
ELECTRICITY
H04L2209/24
ELECTRICITY
H04W92/10
ELECTRICITY
International classification
H04L9/08
ELECTRICITY
H04W92/10
ELECTRICITY
Abstract
A method in a User Equipment (UE) of an Evolved Packet System (EPS) establishes a security key (K_eNB) for protecting Radio Resource Control/User Plane (RRC/UP) traffic exchanged with a serving eNodeB. The method comprises sending a Non-Access Stratum (NAS) Service Request to a Mobility Management Entity (MME), the request indicating a NAS uplink sequence number (NAS_U_SEQ). The method further comprises receiving an indication of the NAS_U_SEQ of the NAS Service Request sent to the MME, back from the MME via the eNodeB. The method further comprises deriving the K_eNB from at least the received indication of the NAS_U_SEQ and from a stored Access Security Management Entity-key (K_ASME) shared with said MME.
Claims
1. A method in a base station for establishing a security key for protecting traffic between a User Equipment (UE) and the base station, the method comprising the following steps: receiving a derived security key from a mobility management entity, wherein the derived security key is received in an Initial Context Setup Request message, and wherein the derived security key is derived based on a Non-Access Stratum (NAS) uplink sequence number and Access Security Management Entity-key; and sending, based on the received derived security key, a radio bearer establishment and/or and a security configuration to the UE.
2. The method of claim 1, wherein sending the radio bearer establishment and a security configuration comprises sending the radio bearer establishment and a security configuration in a same message or in different messages.
3. The method of claim 1, further comprising sending an initial context setup complete message to the mobility management entity.
4. A base station for establishing a security key for protecting traffic between a User Equipment (UE) and the base station, the base station comprising: a receiver configured to receive a derived security key from a mobility management entity, wherein the derived security key is received in an Initial Context Setup Request message, and wherein the derived security key is derived based on a Non-Access Stratum (NAS) uplink sequence number and Access Security Management Entity-key; and a transmitter configured to send, based on the received derived security key, a radio bearer establishment and/or and a security configuration to the UE.
5. The base station of claim 4, wherein the transmitter is further configured to send the radio bearer establishment and the security configuration in a same message or in different messages.
6. The base station of claim 4, wherein the transmitter is further configured to send an initial context setup complete message to the mobility management entity.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The present invention will now be described in more detail, and with reference to the accompanying drawings, in which:
(2)
(3)
(4)
(5)
(6)
(7)
DETAILED DESCRIPTION
(8) In the following description, specific details are set forth, such as a particular architecture and sequences of steps in order to provide a thorough understanding of the present invention. However, it is apparent to a person skilled in the art that the present invention may be practised in other embodiments that may depart from these specific details.
(9) Moreover, it is apparent that the described functions may be implemented using software functioning in conjunction with a programmed microprocessor or a general purpose computer, and/or using an application-specific integrated circuit. Where the invention is described in the form of a method, the invention may also be embodied in a computer program product, as well as in a system comprising a computer processor and a memory, wherein the memory is encoded with one or more programs that may perform the described functions.
(10) The concept or the invention is that the security key, K_eNB, is derived from the Access Security Management Entity-key, K_ASME, and from the uplink sequence counter, NAS_U_SEQ, of the NAS SERVICE REQUEST message sent from the UE to the MME, thereby triggering the establishment of the UP/RRC security context in the eNodeB.
(11) When the UE is in IDLE mode, a NAS security context exists and comprises e.g. the above described K NAS_enc, K NAS_int, NAS_U_SEQ and NAS_D_SEQ, and the NAS messages are integrity- and possibly confidentiality protected. The NAS security context thus also contains the security capabilities of the UE, in particular the encryption and integrity algorithms.
(12) The protection of the NAS messages is based on the NAS security keys, K_NAS_enc, K_NAS_int, and the uplink and downlink sequence counters, NAS_U_SEQ or NAS_D_SEQ, for the direction of the message. The full sequence counter is normally not transmitted with the NAS message, only some of the low order bits, and the full sequence number will be reconstructed at the receiving end from a local estimate of the high order bits and the received low order bits.
(13) The concept of the invention may be explained in the context of the signalling diagram for UE-triggered service requests, as depicted in the above-described
(14) In S1 and S2 of the conventional signalling diagram in
(15) Thereafter, according to this invention, the MME derives the K_eNB based at least on the received uplink sequence counter NAS_U_SEQ and on the K_ASME, using a conventional key derivation function, and this is not included in the conventional signalling diagram illustrated en
(16) In signal S5, the eNodeB sends a Radio Bearer Establishment and a security configuration message (Security Mode Command) to the UE. These messages may be sent as two separate messages or combined in one message, as in
(17) According to this invention, the UE derives the K_eNB based at least on the NAS_U_SEQ and the K_ASME, using a conventional key derivation function, upon reception of the message in signal S5, if not performed before. Thereafter, the eNodeB and the UE will establish the UP/RRC security contexts, and this is not illustrated in the conventional signalling diagram in
(18) According to a first embodiment of this invention, the UE stores the uplink sequence counter, NAS_U_SEQ, included in the initial NAS SERVICE REQUEST in signal S1, and uses the stored NAS_U_SEQ for the derivation of the K_eNB.
(19) However, according to a second embodiment, the MME includes the uplink sequence counter, NAS_U_SEQ, or only low order bits indicating the NAS_U_SEQ, in the S1-AP set-up message, in signal S4, sent to the eNodeB, in which case this information is also forwarded to the UE from the eNodeB during the RRC/UP context establishment. In this case, the UE will be able to retrieve the indication of the NAS_U_SEQ from the eNodeB for the derivation of the K_eNB, and does not have to keep the NAS_U_SEQ of the NAS NAS SERVICE REQUEST-message sent to the MME in the signals S1 and S2.
(20)
(21) Thereafter, not illustrated in
(22) The derivation of the K_eNB is performed by a conventional key derivation function, e.g. by a Pseudo-Random Function; K_eNB=PRF(K_ASME, NAS_U_SEQ, . . . ).
(23) Further, as illustrated by the dots in the above-described PRF-function, the K_eNB-deriving function may have additional conventional input values, such as e.g. the eNodeB-identity.
(24)
(25) Thereafter, the MME forwards the derived K_eNB to the eNodeB 12, in step 34, to be used by the eNodeB to establish the complete UP/RRC security context shared with the UE. In step 35, said UE will derive the same K_eNB from at least the stored K_ASME and from the NAS_U_SEQ of the initial NAS SERVICE REQUEST-message transmitted from the UE to the MME in step 31, and establish the UP/RRC security context from the derived K_eNB.
(26) In the first embodiment of this invention, the UE stores the NAS_U_SEQ transmitted to the MME in the initial NAS NAS SERVICE REQUEST-message, and uses the stored sequence number to derive the K_eNB.
(27)
(28)
(29) Thereafter, the MME includes an indication of the NAS uplink sequence counter, NAS_U_SEQ, in the message forwarding the derived K_eNB to the eNodeB 12, in step 54, and the eNodeB uses the received security key, K_eNB, for establishing a UP/RRC security context. The received NAS_U_SEQ is forwarded to the UE 11 by the eNodeB, in step 55, and in step 56, the UE derives the security key, K_eNB, from at least the K_ASME and from said received NAS_U_SEQ, in order to establish the UP/RRC security context shared with the eNodeB.
(30) The derivation of the K_eNB by the MME, in the step 53, and by the UE, in the step 56, is performed by a suitable conventional key derivation function, e.g. a Pseudo-Random Function; K_eNB=PRF(K_ASME, NAS_U_SEQ, . . . ). Normally, the key derivation function will have additional conventional input values, e.g. the eNodeB-identity.
(31)
(32) The means of the MME 13 illustrated in
(33)
(34) The means of the UE 11 illustrated in the
(35) The above-described means of the MME and the UE, as illustrated in the
(36) While the invention has been described with reference to specific exemplary embodiments, the description is in general only intended to illustrate the inventive concept and should not be taken as limiting the scope of the invention.