Methods, apparatuses and computer program products for fast handover
09924416 ยท 2018-03-20
Assignee
Inventors
Cpc classification
H04L9/0816
ELECTRICITY
International classification
H04L9/08
ELECTRICITY
Abstract
Provided are methods, corresponding apparatuses, and computer program products for a fast handover. A method comprises generating, at a source base station serving a user equipment, a first message and a second message including security information for security communication between a target base station and the user equipment after a fast handover. The method also comprises transmitting simultaneously, from the source base station, the first and second messages respectively to the target base station and the user equipment. With the claimed inventions, a fast X2 handover procedure is complemented and becomes more feasible with proposed security handlings, making it possible to decrease the service interruption during X2 handover for users and hence improve the user experiences.
Claims
1. A method, comprising: generating, at a source base station serving a user equipment, a first message and a second message comprising security information for secure communication between a target base station and the user equipment after a fast handover, wherein the security information is based on an identifier received from the target base station before a handover of the user equipment is performed between the source base station and the target base station, and wherein the fast handover is performed without sending a Handover Request or a Handover Preparation message to the target base station; and transmitting simultaneously, from the source base station, the first message and the second message to the target base station and the user equipment, respectively.
2. The method as recited in claim 1, further comprising: receiving from the target base station cryptography algorithm information including the identifier of at least one cryptography algorithm; and generating, at the source base station, the first message and the second message based on the cryptography algorithm information.
3. The method as recited in claim 2, wherein the cryptography algorithm information further includes corresponding priorities for each of the at least one cryptography algorithm.
4. A method, comprising: generating, at a source base station serving a user equipment, a first message and a second message including security information for security communication between a target base station and the user equipment after a fast handover, and wherein the fast handover is performed without sending Handover Request or a Handover Preparation message to the target base station; and transmitting simultaneously, from the source base station, the first and second messages respectively to the target base station and the user equipment, wherein the first message comprises at least the identifier of a cryptography algorithm selected from the cryptography algorithm based on security capability of the user equipment, and a derived key.
5. The method as recited in claim 4, wherein the derived key (K.sub.eNB*) is derived through a key derivation function using, as inputs, a key (K.sub.eNB), a predefined physical random access channel information, and a cell radio network temporary identity.
6. The method as recited in claim 4, wherein the derived key and the identifier of the cryptography algorithm are used by the target base station and the user equipment to establish secure communication after the fast handover.
7. The method as recited in claim 2, wherein the second message comprises at least physical random access channel information, a cell radio network temporary identity predefined to be used by the user equipment for the fast handover, and the identifier of the selected cryptography algorithm.
8. The method as recited in claim 2, wherein the second message is sent as a radio resource control message.
9. An apparatus, comprising: at least one processor; at least one memory including computer program code, wherein the memory and the computer program code are configured to, work with the processor, to cause the apparatus at least to: generate, at the apparatus serving a user equipment, a first message and a second message comprising security information for secure communication between a target base station and the user equipment after a fast handover, wherein the security information is based on an identifier received from the target base station before a handover of the user equipment is performed between the source base station and the target base station, and wherein the fast handover is performed without sending Handover Request or a Handover Preparation message to the target base station; and transmit simultaneously, from the apparatus, the first message and the second message to the target base station and the user equipment, respectively.
10. The apparatus as recited in claim 9, wherein the memory and the computer program code are configured to, working with the processor, cause the apparatus at least to: receive from the target base station cryptography algorithm information including the identifier of at least one cryptography algorithm; and generate, at the apparatus, the first message and the second message based on the cryptography algorithm information.
11. The apparatus as recited in claim 10, wherein the cryptography algorithm information further comprises corresponding priorities for each of the at least one cryptography algorithm.
12. An apparatus, comprising: at least one processor; at least one memory including computer program code, wherein the memory and the computer program code are configured to, work with the processor, to cause the apparatus at least to: generate, at the apparatus serving a user equipment, a first message and a second message comprising security information for secure communication between a target base station and the user equipment after a fast handover; transmit simultaneously, from the apparatus, the first message and the second message to the target base station and the user equipment, respectively; receive from the target base station cryptography algorithm information including the identifier of at least one cryptography algorithm; and generate, at the apparatus, the first message and the second message based on the cryptography algorithm information, wherein the first message comprises at least the identifier of a cryptography algorithm selected from the at least one cryptography algorithm based on security capability of the user equipment, and a derived key.
13. The apparatus as recited in claim 12, wherein the derived key (K.sub.eNB*) is derived through a key derivation function using, as inputs, a key (K.sub.eNB), a predefined physical random access channel information, and a cell radio network temporary identity.
14. The apparatus as recited in claim 12, wherein the derived key and the identifier of the cryptography algorithm are used by the target base station and the user equipment to establish secure communication after the fast handover.
15. The apparatus as recited in claim 10, wherein the second message comprises at least physical random access channel information, a cell radio network temporary identity predefined to be used by the user equipment for the fast handover, and the identifier of the selected cryptography algorithm.
16. The apparatus as recited in claim 10, wherein the second message is sent as a radio resource control message.
17. An apparatus, comprising: at least one processor; at least one memory including computer program code, wherein the memory and the computer program code are configured to, work with the processor, to cause the apparatus at least to: receive, from a source base station serving the apparatus, a message comprising security information configured for secure communication between a target base station and the apparatus after a fast handover, wherein the security information comprises at least an identifier of a cryptography algorithm received by the source base station before a handover of the user equipment is performed between the source base station and the target base station, and wherein the fast handover is performed without sending Handover Request or a Handover Preparation message to the target base station; derive, at the apparatus, a key for secure communication with the target base station based on the identifier of the cryptography algorithm; and use the derived key for the secure communication with the target base station after the fast handover.
18. The apparatus as recited in claim 17, wherein the message comprising the security information is a radio resource control message.
19. The apparatus as recited in claim 17, wherein the memory and the computer program code are configured to, work with the processor, to cause the apparatus at least to receive, from the source base station, physical random access channel information and a cell radio network temporary identity predefined by the target base station to be used by the apparatus for the fast handover.
20. The apparatus as recited in claim 17, wherein the derived key (K.sub.eNB) is derived through a key derivation function using, as inputs, a key (K.sub.eNB), a physical random access channel information, and a cell radio network temporary identity.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The embodiments of the invention that are presented in the sense of examples and their advantages are explained in greater detail below with reference to the accompanying drawings, in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
DETAILED DESCRIPTION OF EMBODIMENTS
(9) Embodiments of the present invention propose an efficient mechanism of performing a fast HO from a source BS to a target BS in wireless communication systems (e.g., LTE system) such that service continuity for a served UE could be achieved. During such a fast HO, the source BS plays an intermediary role in conveying the security information to both the UE and the target BS such that security communication can be established between the UE and the target BS without further signaling via the X2 interface, thereby implementing the faster HO relative to the legacy HO.
(10) Before detailed description of various embodiments of the present invention, it should be noted that the acronyms BS, NB, and eNB may refer generally to equipments providing wireless network interfaces in a cellular wireless system such as the LTE system, and thus will be used interchangeably throughout the specification and claims.
(11) Embodiments of the present invention will be described in detail as below.
(12)
(13) As mentioned before, during the existing fast X2 HO, the security communication cannot be implemented since the X2 signaling is omitted during the HO preparation and thus the target BS and the UE will not have the correct cryptography keys. To this end, the certain aspects of the present invention and embodiments thereof propose methods, apparatuses and computer program products to achieve security communication between the UE and the target BS, as will be discussed in detail hereinafter in connection with
(14)
(15) In these embodiment, the derived key is K.sub.eNB* derived through a KDF using, as inputs, a key K.sub.eNB, the predefined PRACH information and the C-RNTI. In the embodiments above, the first message including the derived key K.sub.eNB* and the ID of the selected cryptography algorithm may be sent to the target BS in a form of a newly standardized X2 message similar to the HO request message in the legacy HO procedure.
(16) Although not illustrated in
(17) As a part of the existing fast X2 HO, the source BS may also negotiate with the target BS regarding the PRACH and the associated C-RNTI predefined to be used by the UE when the fast X2 HO to the target BS is triggered.
(18) Subsequent to the generation of the first and second messages, the method 200 transmits simultaneously, at step S202, from the source BS, the first and second messages respectively to the target BS and the UE. Simultaneous transmission of the first and second messages enables the UE and the target BS to implement the subsequent HO procedure and security operations in a timely and synchronous manner. For example, upon receipt of the second message, the UE may generate a same key as the derived key and have access to the target BS using the allocated PRACH and C-RNTI. On the other hand, upon receipt of the first message, the target BS may know the specific PRACH and C-RNTI which would be used by the UE for the HO and get well prepared for HO by the UE.
(19) From the above descriptions made with reference to
(20)
(21) At step S302, the method 300 receives, from the source BS, a message including a derived key and an identifier of a cryptography algorithm selected from the at least one cryptography algorithm for the security communication. As noted before, the derived key is K.sub.eNB* derived through a KDF using, as inputs, a key K.sub.eNB, PRACH information and a C-RNTI predefined to be used by the UE for the fast HO. The PRACH information and the C-RNTI can be predefined by the target BS and sent to the source BS when the fast X2 HO is triggered.
(22) Although not shown in
(23)
(24) Upon receiving the message (i.e., the second message in the method 200) from the source BS, the method 400, at step S402, derives a key for security communication with the target BS based on the ID of the cryptography algorithm. As mentioned previously, since there may be a plurality of cryptography algorithm applied by the target BS, the source BS will select a proper cryptograph algorithm based on the UE's capability. In this way, the UE has the possibility and capability of deriving the same key as the one transmitted from the source BS to the target BS based on the algorithm ID. In an embodiment, the derived key is K.sub.eNB* derived through a KDF using, as inputs, a key K.sub.eNB, the PRACH information and the C-RNTI. As an alternative, the derivation of the K.sub.eNB* could also be based on legacy parameters as known to those skilled in the art.
(25) After that, the method proceeds to step S403 at which the method 400 uses the derived key for the security communication with the target base station after the fast HO.
(26)
(27) As illustrated in
(28) At S504, the source BS sends to the target BS an security key indication (i.e., a specific form of the first message as discussed before) which indicates the generated K.sub.eNB* and the algorithm ID of the cryptography algorithm selected based on the security capability of the UE and supported by the target BS, together with the PRACH or C-RNTI predefined by the target BS and used by the UE, to assist the target BS in mapping the key K.sub.eNB* with the UE.
(29) At S505, simultaneously, the source BS sends to the UE another security key indication (i.e., a specific form of the second message as discussed before) via e.g., a dedicated RRC message (e.g., an RRCConnectionReconfiguration message) including pre-defined PRACH information, the associated C-RNTI, a NCC (optional) and the algorithm ID to the UE. At S506, the UE would check if there is algorithm ID in the received RRC message (e.g., the RRCConnectionReconfiguration message). If this is the case, the UE would derives the K.sub.eNB* according to a new KDF using, as inputs, the K.sub.eNB, the predefined PRACH information (e.g., preamble index), and the associated C-RNIT. In an example, instead of using the new KDF, the K.sub.eNB* can be derived from the K.sub.eNB or NH as the legacy X2 HO, together with the PCI, downlink frequency of the target BS. Since the NH is used to derive the key, NCC is needed according to 3GPP TS 33.401.
(30) At S507, upon receiving the security key indication, the target BS may get ready for accepting the UE's access in the indicated PRACH or C-RNTI. Then, at S508, the UE may utilize the PRACH and C-RNTI to access the target BS and conduct security operations based on the K.sub.eNB* and the algorithm ID, and the target BS may optionally trigger a key refresh procedure following this fast X2 handover.
(31)
(32) The PROG 605 is assumed to include program instructions that, when executed by the associated DP 602, enable the UE 601 to operate in accordance with the exemplary embodiments of the present invention, as discussed herein with the method 400.
(33) In general, the various embodiments of the UE 601 can include, but are not limited to, cellular phones, personal digital assistants (PDAs) having wireless communication capabilities, portable computers having wireless communication capabilities, image capture devices such as digital cameras having wireless communication capabilities, gaming devices having wireless communication capabilities, music storage and playback appliances having wireless communication capabilities, Internet appliances permitting wireless Internet access and browsing, as well as portable units or terminals that incorporate combinations of such functions.
(34) The MEM 603 may be of any type suitable to the local technical environment and may be implemented using any suitable data storage technology, such as semiconductor based memory devices, magnetic memory devices and systems, optical memory devices and systems, fixed memory and removable memory, as non-limiting examples. While only one MEM is shown in the UE 601, there may be several physically distinct memory units in the UE 601. The DP 602 may be of any type suitable to the local technical environment, and may include one or more of general purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs) and processors based on multicore processor architecture, as non-limiting examples. The UE 601 may have multiple processors, such as for example an application specific integrated circuit chip that is slaved in time to a clock which synchronizes the main processor.
(35)
(36) The PROG 705 is assumed to include program instructions that, when executed by the associated DP 702, enable the BS 701 to operate in accordance with the exemplary embodiments of the present invention, as discussed herein with the methods 200 and 300.
(37) The MEM 703 may be of any type suitable to the local technical environment and may be implemented using any suitable data storage technology, such as semiconductor based memory devices, magnetic memory devices and systems, optical memory devices and systems, fixed memory and removable memory, as non-limiting examples. While only one MEM is shown in the BS 701, there may be several physically distinct memory units in the BS 701. The DP 702 may be of any type suitable to the local technical environment, and may include one or more of general purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs) and processors based on multicore processor architecture, as non-limiting examples. The BS 701 may have multiple processors, such as for example an application specific integrated circuit chip that is slaved in time to a clock which synchronizes the main processor.
(38) The embodiments of the present invention may be implemented by computer software executable by one or more of the DPs 602, 702 of the UE 601 and the BS 701, or by hardware, or by a combination of software and hardware.
(39) Exemplary embodiments of the present invention have been described above with reference to block diagrams and flowchart illustrations of methods, apparatuses (i.e., systems). It will be understood that each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, respectively, can be implemented by various means including computer program instructions. These computer program instructions may be loaded onto a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions which execute on the computer or other programmable data processing apparatus create means for implementing the functions specified in the flowchart block or blocks.
(40) The foregoing computer program instructions can be, for example, sub-routines and/or functions. A computer program product in one embodiment of the invention comprises at least one computer readable storage medium, on which the foregoing computer program instructions are stored. The computer readable storage medium can be, for example, an optical compact disk or an electronic memory device like a RAM (random access memory) or a ROM (read only memory).
(41) Many modifications and other embodiments of the inventions set forth herein will come to mind to one skilled in the art to which these embodiments of the invention pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the embodiments of the invention are not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.