Communication system, communication terminal, AMF entity, and communication method
11265705 · 2022-03-01
Assignee
Inventors
- Hironori Ito (Tokyo, JP)
- Anand Raghawa Prasad (Tokyo, JP)
- Sivabalan Arumugam (Chennai, IN)
- Sivakamy Lakshminarayanan (Chennai, IN)
- Naoaki Suzuki (Tokyo, JP)
- Andreas Kunz (Heidelberg, DE)
Cpc classification
H04L9/0861
ELECTRICITY
H04L9/08
ELECTRICITY
H04W8/06
ELECTRICITY
International classification
H04L9/08
ELECTRICITY
H04W8/02
ELECTRICITY
Abstract
The present disclosure aims to provide a communication system capable of achieving advanced security in a 5G communication system. The communication system according to the present disclosure includes: a communication terminal (10); an Access and Mobility Management (AMF) entity (20) configured to execute Mobility Management (MM) processing regarding the communication terminal (10); and a Session Management Function (SMF) entity (30) configured to execute Session Management (SM) processing regarding the communication terminal (10), in which the communication terminal (10) sends an MM message used in the MM processing, a first security key having been applied to the MM message, between the communication terminal and the AMF entity (20), and sends an SM message used in the SM processing, a second security key having been applied to the SM message, between the communication terminal and the SMF entity (30) via the AMF entity (20).
Claims
1. A communication system comprising: a communication terminal; an Access and Mobility Management Function (AMF) entity; and a Session Management Function (SMF) entity, wherein: the AMF entity comprises: at least one memory storing instructions, and at least one processor configured to execute the instructions to: execute Mobility Management (MM) processing regarding the communication terminal, the SMF entity comprises at least one memory storing instructions, and at least one processor configured to execute the instructions to: execute Session Management (SM) processing regarding the communication terminal, the communication terminal comprises: at least one memory storing instructions, and at least one processor configured to execute the instructions to: send an MM message used in the MM processing, a first security key having been applied to the MM message, between the communication terminal and the AMF entity, and send an SM message used in the SM processing, a second security key having been applied to the SM message, between the communication terminal and the SMF entity via the AMF entity.
2. The communication system according to claim 1, wherein the SMF entity is associated with a first network slice included in a plurality of network slices generated by applying a network slicing.
3. The communication system according to claim 2, wherein the at least one processor of the AMF entity is further configured to execute the instructions to derive the second security key using identification information for identifying the first network slice and send the second security key that has been derived to the SMF entity.
4. The communication system according to claim 2, wherein the at least one processor of the communication terminal is further configured to execute the instructions to derive the second security key using identification information for identifying the first network slice.
5. The communication system according to claim 1, wherein the SMF entity is a Home (H)-SMF entity arranged in a home network of the communication terminal or a Visited (V)-SMF entity arranged in a roaming destination network of the communication terminal.
6. The communication system according to claim 1, wherein the at least one processor of the communication terminal is further configured to execute the instructions to send the SM message to the AMF entity along with the MM message, and the at least one processor of the AMF entity is further configured to execute the instructions to send the SM message to the SMF entity.
7. The communication system according to claim 1, wherein the communication terminal sends the SM message to which the first security key has been applied to the AMF entity along with the MM message, and the AMF entity sends the SM message to the SMF entity.
8. The communication system according to claim 1, wherein the at least one processor of the communication terminal is further configured to execute the instructions to send the MM message including the SM message to the AMF entity, and the at least one processor of the AMF entity is further configured to execute the instructions to send the SM message to the SMF entity.
9. A communication terminal comprising: at least one memory storing instructions, and at least one processor configured to execute the instructions to: apply a first security key to an MM message used in MM processing and apply a second security key to an SM message used in SM processing; and send the MM message to which the first security key has been applied to an AMF entity that executes the MM processing and send the SM message to which the second security key has been applied to an SMF entity that executes the SM processing via the AMF entity.
10. The communication terminal according to claim 9, wherein the at least one processor of the communication terminal is further configured to execute the instructions to derive the second security key using identification information for identifying a first network slice included in a plurality of network slices generated by applying a network slicing.
11. An AMF entity comprising: at least one memory storing instructions, and at least one processor configured to execute the instructions to: execute MM processing using an MM message to which a first security key has been applied; and forward an SM message sent between a communication terminal and an SMF entity that executes SM processing, a second security key having been applied to the SM message.
12. The AMF entity according to claim 11, wherein the at least one processor of the AMF entity is further configured to derive the second security key, and send the second security key that has been derived to the SMF entity.
Description
BRIEF DESCRIPTION OF DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
(20)
(21)
(22)
DESCRIPTION OF EMBODIMENTS
First Example Embodiment
(23) Hereinafter, with reference to the drawings, example embodiments of the present disclosure will be explained. With reference to
(24) The communication terminal 10 may be a mobile telephone terminal, a smartphone terminal, a tablet terminal or the like. Alternatively, the communication terminal 10 may be an Internet of Things (IoT) terminal, a Machine Type Communication (MTC) terminal, a Machine to Machine (M2M) terminal or the like.
(25) The AMF 20 executes MM processing regarding the communication terminal 10. The SMF 30 executes SM processing regarding the communication terminal 10. The AMF 20 and the SMF 30 are each defined as an entity arranged in a core network in the 3GPP.
(26) The MM processing is executed using an MM message sent between the communication terminal 10 and the AMF 20. A security key for the MM message is applied to the MM message. A security key for the MM message includes, for example, at least one of an encryption key for encrypting the MM message and an integrity protection key for guaranteeing integrity of the MM message.
(27) The SM processing is executed using an SM message sent between the communication terminal 10 and the SMF 30 via the AMF 20. A security key for the SM message is applied to the SM message. The security key for the SM message includes, for example, at least one of an encryption key for encrypting the SM message and an integrity protection key for guaranteeing integrity of the SM message.
(28) As described above, the communication terminal 10 shown in
(29) As described above, the 5G communication system is able to provide advanced security for the UE or the user by applying different security keys to the SM message and the MM message.
Second Example Embodiment
(30) With reference next to
(31) The functions and the operations of the AMF 20, the SMF 30, the UE 40, the AN 50, the AUSF 60, the UDM 70, the UPF 80, the PCF 90, the AF 100, and the DN 110 are defined by the 3GPP. The UE 40 corresponds to the communication terminal 10 shown in
(32) An NG1 is a reference point between the UE 40 and the AMF 20. An NG2 is a reference point between the AN 50 and the AMF 20. An NG3 is a reference point between the AN 50 and the UPF 80. An NG4 is a reference point between the SMF 30 and the UPF 80. An NG5 is a reference point between the PCF 90 and the AF 100. An NG6 is a reference point between the UPF 80 and the DN 10. An NG7 is a reference point between the SMF 30 and the PCF 90. An NG8 is a reference point between the UDM 70 and the AMF 20. An NG9 is a reference point between the two UPFs 80. An NG10 is a reference point between the UDM 70 and the SMF 30. An NG11 is a reference point between the AMF 20 and the SMF 30. An NG12 is a reference point between the AMF 20 and the AUSF 60. An NG13 is a reference point between the AUSF 60 and the UDM 70. An NG14 is a reference point between the two AMFs 20. An NG15 is a reference point between the PCF 90 and the AMF 20. An NG16 is a reference point between the two SMFs 30.
(33) The UDM 70 holds, for example, subscriber data, policy data, or security authentication information (security credential). The security authentication information may be, for example, a security key K.
(34) The AUSF 60 executes authentication regarding whether the UE 40 can be connected to a core network that composes the 5G communication system (hereinafter it will be referred to as a 5G core network).
(35) The UPF 80 configures a PDU session and forwards User data. The PCF 90 sends policy rules regarding the 5G communication system to an entity or a node apparatus in a core network. The AF 100 provides an application service. The DN 110 is a network that sends the user data.
(36) When the network slicing has been applied to the core network and a plurality of network slices have been generated, the SMF 30 and the UPF 80 are arranged for each network slice. Further, while only one UE 40 is shown in
(37) With reference next to
(38) The UE 40 and the UDM 70 each include a security key K. The security key K may be referred to as a master key K. The UDM 70 may execute an Authentication Credential Repository and Processing Function (ARPF).
(39) The UE 40 and the UDM 70 derive a security key K.sub.SEAF from the security key K. Alternatively, the UE 40 and the UDM 70 may derive a Ciphering Key (CK) used for encryption and an Integrity Key (IK) used for integrity protection processing from the security key K. Further, the UE 40 and the UDM 70 may derive the security key K.sub.SEAF from the security key K, or the CK and the IK. The UDM 70 sends the security key K.sub.SEAF to the AMF 20 via the AUSF 60. Alternatively, the UDM 70 may send the security key K.sub.SEAF to the AMF 20 via the reference point NG8.
(40) The UE 40 and the AMF 20 derive a security key K.sub.3GPP_AN, a security key K.sub.non-3GPP_AN, a security key K.sub.NAS_MM, a security key K.sub.NAS_SM, a security key K.sub.UP, and a security key K.sub.AN/NH from the security key K.sub.SEAF. The AMF 20 may execute a Security Anchor Function (SEAF) and a Security Context Management Function (SCMF).
(41) The UE 40 and the AMF 20 may derive a security key K.sub.SCMF from the security key K.sub.SEAF. Further, the UE 40 and the AMF 20 may derive a security key K.sub.NAS_SM and a security key K.sub.UP from the security key K.sub.SCMF. The UE 40 and the AMF 20 derive the security key K.sub.NAS_SM and the security key K.sub.UP from the security key K.sub.SCMF for each network slice using information for identifying the network slice in which the SMF 30 is arranged.
(42) The security key K.sub.3GPP_AN is a security key used in an access network used before LTE. The access network used before LTE includes, for example, an access network using a communication system called LTE, 3G, or 2G. The security key K.sub.non-3GPP_AN is a security key used in an access network that is not defined by the 3GPP.
(43) The security key K.sub.NAS_MM is used in the MM processing. The security key K.sub.NAS_SM is used in the SM processing. The security key K.sub.UP is applied to U-Plane data.
(44) The UE 40 and the AMF 20 derive a security key K.sub.NAs-MMenc and a security key K.sub.NAS-MMint from the security key K.sub.NAS_MM. The security key K.sub.NAS-MMenc is used for encryption of the MM message. The security key K.sub.NAs-MMint is used for integrity protection processing of the MM message.
(45) The AMF 20 sends the security key K.sub.NAS_SM to the SMF 30. The AMF 20 further sends the security key K.sub.UP to the UPF 80. The AMF 20 further sends the security key K.sub.AN/NH to the AN 50.
(46) The SMF 30 derives a security key K.sub.NAS-SMenc and a security key K.sub.NAS-SMint from the security key K.sub.NAS_SM. The security key K.sub.NAS-SMenc is used for encryption of the SM message. The security key K.sub.NAS-SMint is used for integrity protection processing of the SM message. Alternatively, the AMF 20 may derive the security key K.sub.NAS-SMenc and the security key K.sub.NAS-SMint from the security key K.sub.NAS_SM. In this case, the AMF 20 sends the security key K.sub.NAS-SMenc and the security key K.sub.NAS-SMint that have been derived to the SMF 30.
(47) The UPF 80 derives a security key K.sub.Sesslenc and a security key K.sub.Sesslint from the security key K.sub.UP. The security key K.sub.Sesslenc and the security key K.sub.Sesslint are used, for example, in a network slice, which is a network slice 1. Here, the security key K.sub.SessNenc and the security key K.sub.SessNint are used in the network slice, which is a network slice N (N is an integer equal to or larger than one). The security key K.sub.SessNenc is used for encryption of the U-Plane data. The security key K.sub.SessNint is used for integrity protection processing of the U-Plane data.
(48) The AN 50 derives a security key K.sub.RRCenc, a security key K.sub.RRCint, a security key K.sub.UPenc, a security key K.sub.UPint, and a security key K.sub.AN_other from the security key K.sub.AN/NH. The security key K.sub.RRCenc, the security key K.sub.RRCint, the security key K.sub.UPenc, the security key K.sub.UPint, and the security key K.sub.AN_other derived from the security key K.sub.AN/NH are security keys used in a radio section.
(49) With reference next to
(50) The controller 41 derives a security key K.sub.3GPP_AN, a security key K.sub.non-3GPP_AN, a security key K.sub.NAS_MM, a security key K.sub.NAS_SM, and a security key K.sub.UP from the security key K.sub.SEAF.
(51) Further, the controller 41 derives a security key K.sub.NAS-MMenc and a security key K.sub.NAS-MMint from the security key K.sub.NAS_MM. Further, the controller 41 derives a security key K.sub.NAS-SMenc and a security key K.sub.NAS-SMint from the security key K.sub.NAS_SM. Further, the controller 41 derives a security key K.sub.Sesslenc, a security key K.sub.Sesslint, a security key K.sub.SessNenc, and a security key K.sub.SessNint from the security key K.sub.UP.
(52) Further, the controller 41 derives a security key K.sub.RRCenc, a security key K.sub.RRCint, a security key K.sub.UPenc, a security key K.sub.UPint, and a security key K.sub.AN_other from the security key K.sub.AN/NF.
(53) The controller 41 applies the security key K.sub.NAS-MMenc and the security key K.sub.NAS-MMint to the MM message used in the MM processing. Further, the controller 41 applies the security key K.sub.NAS-SMenc and the security key K.sub.NAS-SMint to the SM message used in the SM processing.
(54) The communication unit 42 sends the MM message to which the security key K.sub.NAS-MMenc and the security key K.sub.NAS-MMint are applied to the AMF 20. Further, the communication unit 42 sends the SM message to which the security key K.sub.NAS-SMenc and the security key K.sub.NAS-SMint are applied to the SMF 30 via the AMF 20.
(55) With reference next to
(56) The controller 21 derives a security key K.sub.NAS_MM, a security key K.sub.NAS_SM, and a security key K.sub.UP from the security key K.sub.SEAF. Further, the controller 21 derives a security key K.sub.NAS-MMenc and a security key K.sub.NAS-MMint from the security key K.sub.NAS_MM.
(57) The controller 21 decodes the MM message to which the security key K.sub.NAS-MMenc and the security key K.sub.NAS-MMint are applied, and extracts the MM message. Further, the controller 21 executes the MM processing using the extracted MM message.
(58) The communication unit 22 forwards the SM message sent from the UE 40 to the SMF 30 and forwards the SM message sent from the SMF 30 to the UE 40. Further, the communication unit 22 sends the security key K.sub.NAS_SM to the SMF 30 and sends the security key K.sub.UP to the UPF 80. Further, when the security key K.sub.NAS-SMenc and the security key K.sub.NAS-SMint have been derived from the security key K.sub.NAS_SM in the controller 21, the communication unit 22 sends the security key K.sub.NAS-SMenc and the security key K.sub.NAS-SMint to the SMF 30.
(59) Further, the controller 21 may hold the security key K.sub.NAS_SM. That is, the controller 21 may share the security key K.sub.NAS_SM used in the SMF 30 with the SMF 30.
(60) With reference next to
(61) Next, the AN 50 selects the AMF using the Configured NSSAI and sends the Attach Request message to the selected AMF (S2). In this example, the AN 50 selects the AMF 20 and sends the Attach Request message to the AMF 20. Upon receiving the Attach Request message, the AMF 20 extracts all the accessible SM-NSSAI (Acceptable SM-NSSAI). The SM-NSSAI is used to select the SMF. The SM-NSSAI is information for identifying a network slice that the UE 40 wants to be connected. Further, the AMF 20 generates an Accepted NSSAI and a temp ID, and holds the NSSAI and the temp ID that have been generated. The Accepted NSSAI includes NSSAI indicating at least one network slice to which the UE 40 is allowed to connect.
(62) Next, in the UE 40, the AMF 20, the AUSF 60, and the UDM 70, Authentication and Key Agreement (AKA) processing is executed. A specific procedure of the AKA processing will be explained with reference to Steps S3 to S9 shown below.
(63) By executing the AKA processing, the UE 40 and the AMF 20 are able to hold the same security key K.sub.SEAF. In the following description, the AKA processing will be explained.
(64) When the AMF 20 does not hold the security key K.sub.SEAF regarding the UE 40, the AMF 20 sends an authentication data request message to the AUSF 60 (S3). Next, when the AUSF 60 does not hold the security key K.sub.SEAF regarding the UE 40, the AUSF 60 sends the authentication data request message to the UDM 70 (S4).
(65) Next, the UDM 70 sends an authentication data response message including the security key K.sub.SEAF to the AUSF 60 (S5). Next, the AUSF 60 sends the authentication data response message including the security key K.sub.SEAF to the AMF 20 (S6).
(66) Next, a SEcurity Anchor Function (SEAF) deployed in the AMF 20 generates Authentication Vectors (AVs). The SEAF may be deployed outside the AMF. The AVs include a random number, an authenticating token, and an expected response. The AMF 20 sends an Authentication Request message including the AVs to the UE 40 (S7). The AVs to be sent to the UE 40 include a random number and an authenticating token.
(67) Next, the UE 40 generates a response value in response to the Authentication Request, and sends an Authentication Response message including a response value to the AMF 20 (S8). Further, the UE 40 generates the security key K.sub.SEAF using parameters included in the Authentication Request.
(68) The SEAF deployed in the AMF 20 compares the expected response with the response value sent from the UE 40, and executes decision of AKA (S9). The AMF 20 determines that the UE 40 and the AMF 20 hold the same security key K.sub.SEAF when the expected response and the response value match each other.
(69) Next, the SCMF deployed in the AMF 20 derives a NAS security key K.sub.NAS_MM from the security key K.sub.SEAF. The Security Context Management Function (SCMF) may be deployed outside the AMF 20. Further, the AMF 20 sends a NAS Security Mode Command (SMC) to the UE 40 (S10). The NAS SMC includes information regarding NAS security configurations. The NAS security configurations are, for example, an algorithm and an ID of the key regarding integrity protection and encryption.
(70) Next, the UE 40 derives a NAS security key K.sub.NAS_MM from the security key K.sub.SEAF. The UE 40 sends a NAS SMC complete message to the UE 40 (S11). The UE 40 and the AMF 20 each derive a key regarding integrity protection and encryption from the NAS security key K.sub.NAS_MM using the algorithm sent from the AMF 20 to the UE 40.
(71) Next, the SCMF deployed in the AMF 20 derives an AS security key K.sub.AN from the security key K.sub.SEAF. Further, the AMF 20 sends an Attach Response message to the AN 50 (S12). The Attach Response message includes an AS security key K.sub.AN, a key ID, an Accepted NSSAI, and a temp ID regarding the UE 40.
(72) Next, the AN 50 sends the Attach Response message to the UE 40 (S13). The Attach Response message includes an Accepted NSSAI and a temp ID.
(73) Next, the AN 50 sends the AS SMC to the UE 40 (S14). The AS SMC includes information regarding the AS security configurations. The AS security configurations are, for example, an algorithm and an ID of the key regarding integrity protection and encryption.
(74) Next, the UE 40 derives an AS security key K.sub.AN from the security key K.sub.SEAF. The UE 40 sends the AS SMC complete message to the AN 50 (S15). The UE 40 and the AN 50 each derive the key regarding integrity protection and encryption from the AS security key K.sub.AN using the algorithm sent from the AN 50 to the UE 40.
(75) With reference next to
(76) Next, the SMF 30 selects a UPF and sends an authorization request message regarding the session establishment to extDN via the selected UPF (S17). In this example, the SMF 30 selects the UPF 80. The extDN corresponds to the DN 110. The extDN is an external network different from the mobile network.
(77) Next, authorization is performed in the extDN, and the extDN sends a response message in response to the authorization request message to the SMF 30 via the UPF 80 (S18).
(78) Next, when the UE 40 has been authenticated in the extDN, the SMF 30 sends a session establishment accept message to the UE 40 via the AMF 20 and the AN 50 (S19).
(79) Next, in the following Steps S20 to S23, security establishment regarding the SM message is executed.
(80) The AMF 20 sends the SMC to the UE 40 (S20). The SMC includes information regarding security configurations for the SM message. The security configurations are, for example, an algorithm and an ID of the key regarding integrity protection and encryption.
(81) Next, the UE 40 derives a security key K.sub.NAS_SM for the SM message from the security key K.sub.SEAF using the received algorithm. Alternatively, the UE 40 may derive the security key K.sub.NAS_SM from the security key K.sub.NAS_MM. Further, the UE 40 sends an SMC complete message to the AMF 20 (S21).
(82) Next, the AMF 20 derives a security key K.sub.NAS_SM for the SM message from the security key K.sub.SEAF, similar to the UE 40. Alternatively, the AMF 20 may derive the security key K.sub.NAS_SM from the security key K.sub.NAS_MM. Further, the AMF 20 sends the SMC and the security key K.sub.NAS_SM to the SMF 30 (S22). The SMC includes information regarding the security configurations for the SM message. The security configurations are, for example, an algorithm and an ID of the key regarding integrity protection and encryption.
(83) Next, the SMF 30 sends an SMC complete message to the AMF 20 (S23). The UE 40 and the SMF 30 each derive the key regarding integrity protection and encryption from the security key K.sub.NAS_SM using the algorithm sent from the AMF 20 to the UE 40 and the SMF 30.
(84) Next, in the following Steps S24 to S29, security establishment regarding U-plane data is executed.
(85) The AMF 20 sends an SMC to the UE 40 (S24). The SMC includes information regarding the security configurations for the U-Plane data. The security configurations include, for example, an algorithm and an ID of the key regarding integrity protection and encryption.
(86) Next, the UE 40 derives a security key K.sub.UP for the U-Plane data from the security key K.sub.SEAF using the received algorithm. Alternatively, the UE 40 may derive the security key K.sub.UP from the security key K.sub.NAS_SM. Further, the UE 40 sends an SMC complete message to the AMF 20 (S25).
(87) Next, the AMF 20 derives a security key K.sub.UP for the U-Plane data from the security key K.sub.SEAF, similar to the UE 40. Alternatively, the AMF 20 may derive the security key K.sub.UP from the security key K.sub.NAS_SM. Further, the AMF 20 sends the SMC and the security key K.sub.UP to the SMF 30 (S26). Alternatively, the AMF 20 may send the SMC to the SMF 30 and the SMF 30 may derive the security key K.sub.UP from the security key K.sub.NAS_SM. The SMC includes information regarding security configurations for the U-Plane data. The security configurations are, for example, an algorithm and an ID of the key regarding integrity protection and encryption. Next, the SMF 30 sends the received SMC and the security key K.sub.UP to the UPF 80 (S27).
(88) Next, the UPF 80 sends an SMC complete message to the SMF 30 (S28). Next, the SMF 30 sends the SMC complete message to the AMF 20 (S29). Here, the UE 40 and the UPF 80 each derive the key regarding integrity protection and encryption from the security key K.sub.UP using the algorithm sent from the AMF 20 to the UE 40 and the UPF 80.
(89) As described above, by executing the Attach processing described with reference to
Third Example Embodiment
(90) With reference next to
(91) With reference next to
(92) After the processing shown in
(93) Next, the extDN sends a response message to the H-SMF 32 via the H-UPF 82 as a response message in response to the authorization request message (S35).
(94) Next, the H-SMF 32 sends a session establishment response message to the V-SMF 31 as a response message to the session establishment request message (S36). Next, the V-SMF 31 sends a session establishment accept message to the UE 40 via the AMF 20 and the AN 50 as a response message to the session establishment request message (S37).
(95) Next, in the UE 40 and the V-SMF 31, processing regarding NAS Security (SM) establishment is executed (S38). By executing the processing of Step S38, the UE 40 and the V-SMF 31 are able to hold the same security key K.sub.NAS_SM. Further, in the UE 40 and the H-SMF 32, the processing regarding the NAS Security (SM) establishment is executed (S39). By executing the processing of Step S39, the UE 40 and the H-SMF 32 are able to hold the same security key K.sub.NAS_SM.
(96) Next, the AMF 20 sends the security key K.sub.UP to the V-UPF 81 via the V-SMF 31 (S40). Alternatively, the V-SMF 31 may send the security key K.sub.UP to the H-UPF 82 via the H-SMF 32 (S41). Next, in the UE 40, the V-UPF 81, and the H-UPF 82, processing regarding UP security establishment is executed (S42).
(97) As described above, also when the UE 40 has moved to the roaming network, the same can be applied as a case in which the UE 40 resides in the home network. That is, it becomes possible to apply the security key K.sub.NAS_MM to the MM message sent between the UE 40 and the AMF 20. Further, it becomes possible to apply the security key K.sub.NAS_SM to the SM message sent between the UE 40 and the H-SMF 32.
Fourth Example Embodiment
(98) With reference next to
(99) Further, the MM message sent between the UE 40 and the AMF 20 is subjected to the encryption and integrity protection processing using the security key K.sub.NAS_MM. In other words, the security key K.sub.NAS-MMenc and the security key K.sub.NAS-MMint are applied to the MM message sent between the UE 40 and the AMF 20.
(100) Further, the SM message sent between the UE 40 and the SMF 30 arranged in the network slice A is subjected to the encryption and integrity protection processing using the security key K.sub.NAS_SM for the network slice A. It is assumed that the security key K.sub.NAS_SM for the network slice A will be referred to as a security key K.sub.NAS_SM (NS-A). In other words, the security key K.sub.NAS-SMenc and the security key K.sub.NAS-SMint for the network slice A are applied to the SM message sent between the UE 40 and the SMF 30 arranged in the network slice A.
(101) Further, the SM message sent between the UE 40 and the SMF 30 arranged in the network slice B is subjected to the encryption and integrity protection processing using the security key K.sub.NAS_SM for the network slice B. The security key K.sub.NAS_SM for the network slice B will be referred to as a security key K.sub.NAS_SM (NS-B). In other words, the security key K.sub.NAS-SMenc and the security key K.sub.NAS-SMint for the network slice B are applied to the SM message sent between the UE 40 and the SMF 30 arranged in the network slice B.
(102) With reference to
(103)
(104) Upon receiving the message that has been subjected to the encryption and integrity protection processing using the security key K.sub.NAS_MM, the AMF 20 decodes the received message. As a result, the AMF 20 extracts the MM message, the SM message (NS-A), and the SM message (NS-B).
(105) The AMF 20 sends the SM message (NS-A) in which the encryption and integrity protection processing is being performed using the security key K.sub.NAS_SM (NS-A) to the SMF 30 arranged in the network slice A. Further, the AMF 20 sends the SM message (NS-B) in which the encryption and integrity protection processing is being performed using the security key K.sub.NAS_SM (NS-B) to the SMF 30 arranged in the network slice B.
(106) The SMF 30 arranged in the network slice A and the SMF 30 arranged in the network slice B each decode the received message and extract an SM message (NS-A) and an SM message (B).
(107) With reference next to
(108) However, in
(109) Upon receiving the SM message (NS-A) and the SM message (NS-B), the AMF 20 decodes the received MM message. As a result, the AMF 20 extracts the MM message. The MM message is subjected to the encryption and integrity protection processing using the security key K.sub.NAS_MM. The SM message (NS-A) is subjected to the encryption and integrity protection processing using the MM message and the security key K.sub.NAS_SM (NS-A). The SM message (NS-B) is subjected to the encryption and integrity protection processing using the security key K.sub.NAS_SM (NS-B).
(110) The AMF 20 sends the SM message (NS-A) in which the encryption and integrity protection processing is being performed using the security key K.sub.NAS_SM (NS-A) to the SMF 30 arranged in the network slice A. Further, the AMF 20 sends the SM message (NS-B) in which the encryption and integrity protection processing is being performed using the security key K.sub.NAS_SM (NS-B) to the SMF 30 arranged in the network slice B.
(111) The SMF 30 arranged in the network slice A and the SMF 30 arranged in the network slice B each decode the received message and extract the SM message (NS-A) and the SM message (B).
(112) With reference next to
(113) However,
(114) Upon receiving the MM message in which the encryption and integrity protection processing is performed using the security key K.sub.NAS_MM, the AMF 20 decodes the received MM message. Further, the AMF 20 separates the SM message (NS-A) and the SM message (NS-B) from the MM message. As a result, the AMF 20 extracts the MM message.
(115) The AMF 20 sends the SM message (NS-A) in which the encryption and integrity protection processing is being performed using the security key K.sub.NAS_SM (NS-A) to the SMF 30 arranged in the network slice A. Further, the AMF 20 sends the SM message (NS-B) in which the encryption and integrity protection processing is being performed using the security key K.sub.NAS_SM (NS-B) to the SMF 30 arranged in the network slice B.
(116) The SMF 30 arranged in the network slice A and the SMF 30 arranged in the network slice B each decode the received message and extract the SM message (NS-A) and the SM message (NS-B).
(117) As described above, in some cases, the MM message and at least one SM message are sent in one message. In this case, encryption and integrity protection processing may be performed using the security key K.sub.NAS_SM (NS-A) to be applied to the MM message and the security key K.sub.NAS_SM to be applied to the SM message.
Fifth Example Embodiment
(118) With reference next to
(119) Further, the message sent between the UE 40 and the AMF 20 is subjected to the encryption and integrity protection processing using the security key K.sub.NAS_MM. In other words, the security key K.sub.NAS-MMenc and the security key K.sub.NAS-MMint are applied to the message sent between the UE 40 and the AMF 20.
(120) A Network Domain Security (NDS) is applied between the AMF 20 and the SMF 30 arranged in the network slice A and between the AMF 20 and the SMF 30 arranged in the network slice B. The NDS is security applied between the AMF 20 and the SMF 30. For example, security of the NDS between the AMF 20 and the SMF 30 is ensured using, for example, IPsec. When the NDS is used between the AMF 20 and the SMF 30, a security key K.sub.NDS may be shared in advance between the AMF 20 and the SMF 30.
(121) With reference to
(122)
(123) Upon receiving the message that has been subjected to the encryption and integrity protection processing using the security key K.sub.NAS_MM, the AMF 20 decodes the received message. As a result, the AMF 20 extracts the MM message, the SM message (NS-A), and the SM message (NS-B).
(124) The AMF 20 sends, to the SMF 30 arranged in the network slice A, an SM message (NS-A) to which NDS for the network slice A has been applied. Applying the NDS for the network slice A may be, for example, applying the security key K.sub.NDS used in IPsec configured between the AMF 20 and the SMF 30 arranged in the network slice A.
(125) Further, the AMF 20 sends, to the SMF 30 arranged in the network slice B, the SM message (NS-B) to which the NDS for the network slice B is applied.
(126) The SMF 30 arranged in the network slice A and the SMF 30 arranged in the network slice B each decode the received message and extract the SM message (NS-A) and the SM message (B).
(127) The NDS may be applied between the AMF 20 and the SMF 30 arranged in the network slice A, similar to the case shown in
(128) Further, the MM message and the SM message (NS-A) may be subjected to the encryption and integrity protection processing using the security key K.sub.NAS_MM between the UE 40 and the AMF 20. Further, the SM message (NS-B) may be subjected to the encryption and integrity protection processing using the security key K.sub.NAS_SM (NS-B).
(129) Further, between the UE 40 and the AMF 20, the SM message (NS-A), and the SM message (NS-B) in which the encryption and integrity protection processing is being performed using the security key K.sub.NAS_SM (NS-B) may be a part of the MM message.
(130) As described above, the NDS is applied between the AMF 20 and the SMF 30, whereby different security can be applied to the MM message and the SM message.
Sixth Example Embodiment
(131) With reference next to
(132) The MM message sent between the UE 40 and the AMF 20 arranged in the roaming network is subjected to the encryption and integrity protection processing using the security key K.sub.NAS_MM. In other words, the security key K.sub.NAS-MMenc and the security key K.sub.NAS-MMint are applied to the MM message sent between the UE 40 and the AMF 20.
(133) Further, the SM message sent between the UE 40 and the H-SMF 32 is subjected to the encryption and integrity protection processing using the security key K.sub.NAS_SM (NS-A) for the network slice A in the home network. In other words, the security key K.sub.NAS-SMenc and the security key K.sub.NAS-SMint for the network slice A are applied to the MM message sent between the UE 40 and the AMF 20.
(134) With reference now to
(135)
(136) Upon receiving the message that has been subjected to the encryption and integrity protection processing using the security key K.sub.NAS_MM, the AMF 20 decodes the received message. As a result, the AMF 20 extracts the MM message, and the SM message (NS-A) in which the encryption and integrity protection processing is being performed using the security key K.sub.NAS_SM (NS-A).
(137) The AMF 20 sends the SM message (NS-A) in which the encryption and integrity protection processing is being performed using the security key K.sub.NAS_SM (NS-A) to the H-SMF 32 via the V-SMF 31.
(138) The H-SMF 32 decodes the received message and extracts the SM message (NS-A).
(139) With reference next to
(140) However, in
(141) Upon receiving the MM message and the SM message (NS-A), the AMF 20 decodes the received MM message. The MM message is subjected to the encryption and integrity protection processing using the security key K.sub.NAS_MM. The SM message (NS-A) is subjected to the encryption and integrity protection processing using the security key K.sub.NAS_SM (NS-A). As a result, the AMF 20 extracts the MM message.
(142) The AMF 20 sends the SM message (NS-A) in which the encryption and integrity protection processing is being performed using the security key K.sub.NAS_SM (NS-A) to the H-SMF 32 via the V-SMF 31.
(143) The H-SMF 32 decodes the received message and extracts the SM message (NS-A).
(144) With reference next to
(145) However,
(146) Upon receiving the MM message in which the encryption and integrity protection processing is being performed using the security key K.sub.NAS_MM, the AMF 20 decodes the received MM message. Further, the AMF 20 separates the SM message (NS-A) in which the encryption and integrity protection processing is being performed using the security key K.sub.NAS_SM (NS-A) from the MM message. As a result, the AMF 20 extracts the MM message.
(147) The AMF 20 forwards the SM message (NS-A) in which the encryption and integrity protection processing is being performed using the security key K.sub.NAS_SM (NS-A) to the H-SMF 32 via the V-SMF 31.
(148) The H-SMF 32 decodes the received message and extracts the SM message (NS-A).
(149) As described above, in some cases, the MM message and at least one SM message are sent as one message via the roaming network. Even in this case, encryption and integrity protection processing can be performed using the security key K.sub.NAS_SM (NS-A) and the security key K.sub.NAS_SM. The security key K.sub.NAS_SM (NS-A) is applied to the MM message. The security key K.sub.NAS_SM is applied to the SM message.
Seventh Example Embodiment
(150) With reference next to
(151) Further, the message sent between the UE 40 and the AMF 20 is subjected to the encryption and integrity protection processing using the security key K.sub.NAS_MM. In other words, the security key K.sub.NAS-MMenc and the security key K.sub.NAS-MMint are applied to the message sent between the UE 40 and the AMF 20.
(152) The message sent between the UE 40 and the V-SMF 31 is subjected to the encryption and integrity protection processing using the security key K.sub.NAS_SM (NS-A′).
(153) A Network Domain Security (NDS) is applied between the V-SMF 31 arranged in the roaming network and the H-SMF 32 arranged in the home network. When the NDS is used between the V-SMF 31 and the H-SMF 32, the security key K.sub.NDS may be shared between the V-SMF 31 and the H-SMF 32 in advance.
(154) Now, with reference to
(155)
(156) Upon receiving the message that has been subjected to the encryption and integrity protection processing using the security key K.sub.NAS_MM, the AMF 20 decodes the received message. As a result, the AMF 20 extracts the MM message, and the SM message (NS-A) to which the security key K.sub.NAS_SM (NS-A′) is applied.
(157) The AMF 20 sends, to the V-SMF 31, the SM message (NS-A) to which the security key K.sub.NAS_SM (NS-A′) is applied. Upon receiving the SM message (NS-A) to which the security key K.sub.NAS_SM (NS-A′) is applied, the V-SMF 31 decodes the received message. As a result, the V-SMF 31 extracts the SM message (NS-A).
(158) The V-SMF 31 sends an SM message (NS-A) to which NDS for the network slice A has been applied to the H-SMF 32 that is arranged in the network slice A of the home network.
(159) The H-SMF 32 decodes the received message and extracts the SM message (NS-A).
(160) Further, the message that the UE 40 sends to the AMF 20 may have a format other than the one shown in
(161) With reference next to
(162)
(163) Upon receiving the message that has been subjected to the encryption and integrity protection processing using the security key K.sub.NAS_MM, the AMF 20 decodes the received message. As a result, the AMF 20 extracts the MM message and the SM message (NS-A).
(164) The AMF 20 sends, to the V-SMF 31 arranged in the network slice A′, an SM message (NS-A) to which NDS for the network slice A′ has been applied.
(165) The V-SMF 31 decodes the SM message (NS-A) to which NDS for the network slice A′ is applied, and extracts the SM message (NS-A). After that, the V-SMF 31 sends, to the H-SMF 32 that is arranged in the network slice A, an SM message (NS-A) to which NDS for the network slice A has been applied.
(166) The H-SMF 32 decodes the received message and extracts the SM message (NS-A).
(167) Further, the message that the UE 40 sends to the AMF 20 may not have the format shown in
(168) As described above, the NDS is applied to at least one of a part between the AMF 20 and the V-SMF 31 and a part between the V-SMF 31 and the H-SMF 32, whereby different security can be applied to the MM message and the SM message.
(169) Further, in each of the aforementioned example embodiments, the security key held by the SMF 30 may be deleted when, for example, the UE has been detached. Further, the security keys held by the UE 40 and the SMF 30 may be updated based on the request from the UE 40 or the AMF 20. The AMF 20 may send, for example, a random number to the UE 40 and the SMF 30, and the UE 40 and the SMF 30 may update the security using the received random number.
Eighth Example Embodiment
(170) With reference next to
(171) First, the UE 40 sends a Registration request message to the AN 50 (S51). The Registration request message includes a Configured NSSAI. Further, the AN 50 selects the AMF 20 and forwards the Registration request message including the Configured NSSAI to the selected AMF 20 (S51).
(172) Upon receiving the Registration request message, the AMF 20 extracts all the accessible SM-NSSAI (Acceptable SM-NSSAI). The SM-NSSAI is used to select the SMF. The SM-NSSAI is information for identifying the network slice to which the UE 40 wants to be connected. Further, the AMF 20 generates an Accepted NSSAI and a temp ID, and holds the NSSAI and the temp ID that have been generated. The AMF 20 sends an authentication data request message including the Accepted NSSAI and the temp ID to the AUSF 60. Further, the AUSF 60 forwards the authentication data request message to the UDM 70 (S52).
(173) The AMF 20 or the AUSF 60 updates the NSSAI when the NSSAI sent from the UE 40 and the NSSAI recognized on the network side are different from each other. Further, when the UE 40 has not sent an effective NSSAI, the AMF 20 may execute a Network Slice Selection Function (NSSF) in order to select the network slice.
(174) Next, the UDM 70 sends a security configuration request message to the SSS in order to acquire all the kinds of information regarding the security configuration that are required for the UE 40 (S53). Next, the SSS sends a security configuration response message to the UDM 70 (S54). The security configuration response message includes security configuration requested in the security configuration request message. The security configuration is stored in the SSS as a security profile. The security profile is composed of a set of security configurations such as an algorithm, a key length and the like. Further, the security profile is used in the UE 40 and a network slice to which the UE 40 wants to be connected. The security profile ID is sent to the UDM 70, the AUSF 60, the AMF 20, the UPF 80, the UE 40 and the like along with the security configuration.
(175) Next, the UDM 70 selects related security configuration based on the service requirement of the UE 40 in order to establish the NAS MM security and the AS security. The UDM 70 selects, for example, an algorithm, a key length or the like (S55). The UDM 70 further generates Authentication Vectors (AVs) (S55).
(176) Next, the UDM 70 sends an authentication data response message to the AUSF 60, and the AUSF 60 forwards the received authentication data response message to the AMF 20 (S56). The authentication data response message includes the selected security configuration and the AVs.
(177) Next, AKA is executed between the UE 40 and the AMF 20 using the AVs provided by the UDM 70 (S57).
(178) Next, the AMF 20 sends NAS MM SMC to the UE 40 (S58). The NAS MM SMC includes security configurations selected in the UDM 70. Next, the UE 40 sends a NAS MM SMC complete message to the AMF 20 (S59). Accordingly, the NAS MM security is established between the UE 40 and the AMF 20.
(179) Next, the AMF 20 sends a Registration accept message to the AN 50 and the AN 50 forwards a Registration accept message to the UE 40 (S60). The Registration accept message includes security configurations and a temp ID.
(180) Next, the AN 50 sends the AS SMC to the UE 40 (S61). The AS SMC includes security configuration selected by the UDM 70. Next, the UE 40 sends the AS SMC complete message to the AN 50 (S62). Accordingly, the AS security is established between the UE 40 and the AN 50. Here, when the RAN slicing is applied, the security configuration is provided for each slice and the AS security is established for each slice.
(181) With reference next to
(182) Next, the SMF 30 sends a Slice security configuration request message to the SSS when it does not hold configurations for establishing the NAS MM security and the U-plane data security (S64). The Slice security configuration request message includes an SM-NSSAI and a temp ID.
(183) Next, the SSS sends a Slice security configuration response message including the requested configuration to the SMF 30 (S65).
(184) Next, the SMF 30 selects the UPF 80, and Session authorization for accessing the extDN via the UPF 80 is executed (S66). Next, the SMF 30 sends a Session accept message to the UE 40 via the AMF 20 and the AN 50 (S67). Next, the SMF 30 sends NAS SM SMC including security configurations to the UE 40 (S68). Next, the UE 40 sends a NAS SM SMC complete message to the SMF 30 (S69). Accordingly, the NAS SM security is established between the UE 40 and the SMF 30.
(185) Next, the SMF 30 sends a Session establishment request message including security configurations to the UPF 80 (S70). Next, the UPF 80 sends U-plane data SMC including the security configurations to the UE 40 (S71). Next, the UE 40 sends a U-plane data SMC complete message to the UPF 80 (S72). Accordingly, U-plane data security between the UE 40 and the UPF 80 is established.
(186) As described above, by executing the security processing shown in
(187) Next, in the following description, a configuration example of the UE 40 and the AMF 20 described in the above example embodiments will be explained.
(188)
(189) The baseband processor 1103 performs digital baseband signal processing (i.e., data-plane processing) and control-plane processing for radio communication. The digital baseband signal processing includes (a) data compression/decompression, (b) data segmentation/concatenation, and (c) composition/decomposition of a transmission format (i.e., transmission frame). The digital baseband signal processing further includes (d) channel coding/decoding and (e) modulation (i.e., symbol mapping)/demodulation. The digital baseband signal processing further includes (f) generation of OFDM symbol data (i.e., baseband OFDM signal) by Inverse Fast Fourier Transform (IFFT). Meanwhile, the control-plane processing includes communication management of layer 1, layer 2, and layer 3. The layer 1 is, for example, transmission power control. The layer 2 is, for example, radio resource management and hybrid automatic repeat request (HARQ) processing. The layer 3 is, for example, signaling regarding attach, mobility, and call management.
(190) In the case of LTE and LTE-Advanced, for example, the digital baseband signal processing by the baseband processor 1103 may include, for example, signal processing of a Packet Data Convergence Protocol (PDCP) layer, a Radio Link Control (RLC) layer, a MAC layer, and a PHY layer. Further, the control-plane processing performed by the baseband processor 1103 may include processing of a Non-Access Stratum (NAS) protocol, an RRC protocol, and MAC CEs.
(191) The baseband processor 1103 may include a modem processor that performs the digital baseband signal processing and a protocol stack processor that performs the control-plane processing. The modem processor is, for example, a Digital Signal Processor (DSP). The protocol stack processor, which performs the control-plane processing, may be, for example, a Central Processing Unit (CPU) or a Micro Processing Unit (MPU). In this case, the protocol stack processor, which performs the control-plane processing, may be integrated with an application processor 1104 described in the following.
(192) The application processor 1104 is also referred to as a CPU, an MPU, a microprocessor, or a processor core. The application processor 1104 may include a plurality of processors (processor cores). The application processor 1104 loads a system software program and various application programs from a memory 1106 or from another memory (not shown) and executes these programs, thereby providing various functions of the UE 40. The system software program may be, for example, an Operating System (OS). The application program may be, for example, a call application, a WEB browser, a mailer, a camera operation application, or a music player application.
(193) In some implementations, as represented by a dashed line (1105) in
(194) The memory 1106 is a volatile memory, a non-volatile memory, or a combination thereof. The memory 1106 may include a plurality of memory devices that are physically independent from each other. The volatile memory is, for example, a Static Random Access Memory (SRAM), a Dynamic RAM (DRAM), or a combination thereof. The non-volatile memory is, for example, a mask Read Only Memory (MROM), an Electrically Erasable Programmable ROM (EEPROM), a flash memory, a hard disc drive, or any combination thereof. The memory 1106 may include, for example, an external memory device that can be accessed from the baseband processor 1103, the application processor 1104, and the SoC 1105. The memory 1106 may include an internal memory device that is integrated in the baseband processor 1103, the application processor 1104, or the SoC 1105. Further, the memory 1106 may include a memory in a Universal Integrated Circuit Card (UICC).
(195) The memory 1106 may store a software module (computer program) including instructions and data to perform the processing by the UE 40 described in the above embodiments. In some implementations, the baseband processor 1103 or the application processor 1104 may load this software module from the memory 1106 and execute the loaded software module, thereby performing the processing of the UE 40 described in the above embodiments.
(196)
(197) The processor 1202 loads software (computer programs) from the memory 1203 and executes the loaded software (computer programs), thereby performing processing of the AMF 20 described with reference to the sequence diagram and the flowchart in the above-described example embodiments. The processor 1202 may be, for example, a microprocessor, an MPU, or a CPU. The processor 1202 may include a plurality of processors.
(198) The memory 1203 is composed of a combination of a volatile memory and a non-volatile memory. The memory 1203 may include a storage located apart from the processor 1202. In this case, the processor 1202 may access the memory 1203 via an I/O interface (not shown).
(199) In the example shown in
(200) As described above with reference to
(201) The present disclosure is not limited to the above example embodiments and may be changed as appropriate without departing from the spirit of the present disclosure. Further, the present disclosure may be executed by combining the example embodiments as appropriate.
(202) While the present disclosure has been described with reference to the example embodiments, the present disclosure is not limited to the aforementioned example embodiments. Various changes that can be understood by those skilled in the art can be made to the configurations and the details of the present disclosure within the scope of the present disclosure.
(203) This application is based upon and claims the benefit of priority from Indian Patent Application No. 201711001823, filed on Jan. 17, 2017, and Indian Patent Application No. 201711003074, filed on Jan. 27, 2017, the disclosures of which are incorporated herein in its entirety by reference.
(204) For example, the whole or part of the above embodiments can be described as, but not limited to, the following supplementary notes.
(205) (Supplementary Note 1)
(206) A communication system comprising:
(207) a communication terminal;
(208) an Access and Mobility Management (AMF) entity configured to execute Mobility Management (MM) processing regarding the communication terminal; and
(209) a Session Management Function (SMF) entity configured to execute Session Management (SM) processing regarding the communication terminal, wherein
(210) the communication terminal sends an MM message used in the MM processing, a first security key having been applied to the MM message, between the communication terminal and the AMF entity, and sends an SM message used in the SM processing, a second security key having been applied to the SM message, between the communication terminal and the SMF entity via the AMF entity.
(211) (Supplementary Note 2)
(212) The communication system according to Supplementary Note 1, wherein the SMF entity is associated with a first network slice included in a plurality of network slices generated by applying a network slicing.
(213) (Supplementary Note 3)
(214) The communication system according to Supplementary Note 2, wherein the AMF entity derives the second security key using identification information for identifying the first network slice and sends the second security key that has been derived to the SMF entity.
(215) (Supplementary Note 4)
(216) The communication system according to Supplementary Note 2 or 3, wherein the communication terminal derives the second security key using identification information for identifying the first network slice.
(217) (Supplementary Note 5)
(218) The communication system according to any one of Supplementary Notes 1 to 4, wherein the SMF entity is a Home (H)-SMF entity arranged in a home network of the communication terminal or a Visited (V)-SMF entity arranged in a roaming destination network of the communication terminal.
(219) (Supplementary Note 6)
(220) The communication system according to any one of Supplementary Notes 1 to 5, wherein
(221) the communication terminal sends the SM message to the AMF entity along with the MM message, and
(222) the AMF entity sends the SM message to the SMF entity.
(223) (Supplementary Note 7)
(224) The communication system according to any one of Supplementary Notes 1 to 5, wherein
(225) the communication terminal sends the SM message to which the first security key has been applied to the AMF entity along with the MM message, and
(226) the AMF entity sends the SM message to the SMF entity.
(227) (Supplementary Note 8)
(228) The communication system according to any one of Supplementary Notes 1 to 5, wherein
(229) the communication terminal sends the MM message including the SM message to the AMF entity, and
(230) the AMF entity sends the SM message to the SMF entity.
(231) (Supplementary Note 9)
(232) A communication system comprising:
(233) a communication terminal;
(234) an Access and Mobility Management (AMF) entity configured to execute Mobility Management (MM) processing regarding the communication terminal; and
(235) a Session Management Function (SMF) entity configured to execute Session Management (SM) processing regarding the communication terminal, wherein
(236) the communication terminal and the AMF entity apply a first security key to an MM message used in the MM processing, and
(237) the AMF entity and the SMF entity apply a Network Domain Security (NDS) to an SM message used in the SM processing.
(238) (Supplementary Note 10)
(239) The communication system according to Supplementary Note 9, wherein
(240) the SMF entity includes a first SMF entity associated with a first network slice included in a plurality of network slices generated by applying a network slicing and a second SMF entity associated with a second network slice included in the plurality of network slices,
(241) the AMF entity and the first SMF entity apply an NDS to a first SM message used in the SM processing, and
(242) the AMF entity and the second SMF entity apply a second security key that is different from the first security key to a second SM message used in the SM processing.
(243) (Supplementary Note 11)
(244) The communication system according to Supplementary Note 9, wherein the SMF entity is a Home (H)-SMF arranged in a home network of the communication terminal or a Visited (V)-SMF arranged in a roaming destination network of the communication terminal.
(245) (Supplementary Note 12)
(246) The communication system according to any one of Supplementary Notes 9 to 11, wherein
(247) the communication terminal sends the SM message to which the first security key has been applied to the AMF entity along with the MM message, and
(248) the AMF entity sends the SM message to the SMF entity.
(249) (Supplementary Note 13)
(250) The communication system according to any one of Supplementary Notes 1 to 5, wherein
(251) the communication terminal sends the MM message including the SM message to the AMF entity, and
(252) the AMF entity sends the SM message to the SMF entity.
(253) (Supplementary Note 14)
(254) The communication system according to Supplementary Note 10, wherein
(255) the communication terminal sends the first SM message and the second SM message to which the first security key has been applied to the AMF entity along with the MM message, and
(256) the AMF entity sends the first SM message to the first SMF entity and sends the second SM message to the second SMF entity.
(257) (Supplementary Note 15)
(258) A communication terminal comprising:
(259) control means for applying a first security key to an MM message used in MM processing and applying a second security key to an SM message used in SM processing; and
(260) communication means for sending the MM message to which the first security key has been applied to an AMF entity that executes the MM processing and sending the SM message to which the second security key has been applied to the SMF entity that executes the SM processing via the AMF entity.
(261) (Supplementary Note 16)
(262) The communication terminal according to Supplementary Note 15, wherein the communication terminal derives the second security key using identification information for identifying a first network slice included in a plurality of network slices generated by applying a network slicing.
(263) (Supplementary Note 17)
(264) An AMF entity comprising:
(265) control means for executing MM processing using an MM message to which a first security key has been applied; and
(266) communication means for forwarding an SM message sent between a communication terminal and an SMF entity that executes SM processing, a second security key having been applied to the SM message.
(267) (Supplementary Note 18)
(268) The AMF entity according to Supplementary Note 16, wherein
(269) the control means derives the second security key, and
(270) the communication means sends the second security key that has been derived to the SMF entity.
(271) (Supplementary Note 19)
(272) A communication method in a communication terminal, the method comprising:
(273) applying a first security key to an MM message used in MM processing;
(274) sending the MM message to which the first security key has been applied to an AMF entity that executes the MM processing;
(275) applying a second security key to an SM message used in SM processing; and
(276) sending the SM message to which the second security key has been applied to the SMF entity that executes the SM processing via the AMF entity.
REFERENCE SIGNS LIST
(277) 10 COMMUNICATION TERMINAL 20 AMF 21 CONTROLLER 22 COMMUNICATION UNIT 30 SMF 31 V-SMF 32 H-SMF 40 UE 41 CONTROLLER 42 COMMUNICATION UNIT 50 AN 60 AUSF 70 UDM 80 UPF 81 V-UPF 82 H-UPF 90 PCF 91 V-PCF 92 H-PCF 100 AF 110 DN