CN100550902C - A kind of method of improved IP Multimedia System Authentication and Key Agreement - Google Patents

A kind of method of improved IP Multimedia System Authentication and Key Agreement Download PDF

Info

Publication number
CN100550902C
CN100550902C CNB200510069328XA CN200510069328A CN100550902C CN 100550902 C CN100550902 C CN 100550902C CN B200510069328X A CNB200510069328X A CN B200510069328XA CN 200510069328 A CN200510069328 A CN 200510069328A CN 100550902 C CN100550902 C CN 100550902C
Authority
CN
China
Prior art keywords
control function
function unit
conversation control
call conversation
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB200510069328XA
Other languages
Chinese (zh)
Other versions
CN1863194A (en
Inventor
吕东旭
芦东昕
陈璟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CNB200510069328XA priority Critical patent/CN100550902C/en
Publication of CN1863194A publication Critical patent/CN1863194A/en
Application granted granted Critical
Publication of CN100550902C publication Critical patent/CN100550902C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The method of a kind of improved IP Multimedia System Authentication and Key Agreement of the present invention said method comprising the steps of: the correctness of subscriber equipment check MAC Address, if authentication failed, the user refuses network; Otherwise the user continues to verify SQN or the RN that is included in the authentication marks IdxWhether can accept; If check successfully, subscriber equipment will calculate RES and send to Proxy Call Session Control Function so, and subscriber equipment also calculates encryption key and Integrity Key simultaneously; Proxy Call Session Control Function sends to the query call conversation control function to message, and wherein the query call conversation control function requires home subscriber servers to provide the address of service call conversation control function; The query call conversation control function sends to service call conversation control function to RES.The inventive method has been eliminated redirection attack, network spoofing and the sequence number difficult management of prior art, has improved fail safe.

Description

A kind of method of improved IP Multimedia System Authentication and Key Agreement
Technical field
The present invention relates to the Authentication and Key Agreement method in the communication field, in particular, the method for the Authentication and Key Agreement of a kind of improved IP Multimedia System in the communication field (IMS AKA).
Background technology
3G (Third Generation) Moblie partnership project (3GPP) is being carried out the definition work based on the standard of the 3G (Third Generation) Moblie of WCDMA, and this standard can provide the high-speed mobile communications business based on circuit domain and packet domain.In order to ensure IP in fixed network, mobile network in real time, the interoperability of non-real-time service, 3GPP is organized in and has defined IP Multimedia System (IP multimedia subsystem is hereinafter to be referred as IMS) on the packet domain.In IMS, Authentication and Key Agreement adopts and the similar mechanism of UMTS (general mobile land system) Authentication and Key Agreement (AKA), and it is a request/response protocol.Authentication and Key Agreement among the IMS is called as IMS AKA, and it provides two-way authentication between user and the IMS to strengthen the access security ability of IMS network.
The flow process of the IMS AKA of prior art is such:
(1). user equipment (UE) sends a Session initiation Protocol session initiation protocol registration information to Proxy Call Session Control Function P-CSCF, wherein comprises the open identity IMPU of privately owned identity IMPI of IP multimedia and IP multimedia.P-CSCF and query call conversation control function I-CSCF send to service call conversation control function S-CSCF to session initiation protocol registration message.
(2) .S-CSCF is to home subscriber servers HSS request authentication vector.
(3) .HSS transmission Ciphering Key responds to S-CSCF, and each Ciphering Key comprises following element: a random number RA ND, the response XRES of an expectation, an encryption key CK, an Integrity Key IK and an authentication marks AUTN.
(4) .S-CSCF sends authentication request to UE, comprises random number RA ND, authentication marks AUTN, encryption key CK and Integrity Key IK.P-CSCF stores these keys, and random number RA ND and authentication marks AUTN are sent to UE.
(5) .UE receives AUTN, and comprising MAC and SQN, UE calculates XMAC, and checks whether XMAC equals MAC and SQN is in correct scope.If these checks are successful, UE will calculate RES so, and send to P-CSCF.UE calculates CK and IK simultaneously.P-CSCF sends to I-CSCF to message, and wherein I-CSCF requires HSS to provide the address of S-CSCF.Then, I-CSCF sends to S-CSCF to RES.
(6) .S-CSCF obtains XRES, and the RES that it and UE are sent is compared, if identical, authentification of user network success so.
There is following defective in this agreement of prior art:
(1). be subjected to redirection attack easily
Suppose user and P-CSCF in visit net, and the assailant just operating the equipment that base station functions is arranged, false base station, it broadcasts the identity of HSS this equipment for we.In case the assailant has intercepted connection from the user, he just lures the user to quarter on the wireless channel of false base station.The assailant sends connection request with user identity to the visit net that he selects then, and transmits information between user and S-CSCF faithfully.User side and S-CSCF authentication all will be successfully, by the cryptographic key protection communication of setting up.In this way, the assailant can be redirected customer service and be flow to non-purpose network.
(2). the active attack in the net of easily being damaged
Destroyed when a network, the assailant can eavesdrop and destroy the information that network sends or receives, and can forge authentication data request and send to home network by destroying network.Can obtain the Ciphering Key of Any user in this way, not limited by user's physical location.The assailant also can imitate any subscriber who destroys network.And can use the Ciphering Key imitation of acquisition to destroy network.By the authentication data request that floods to HSS, the assailant can impel counter SQN HSSReach peak.Because SQN HSSMaximum limited, can shorten lifetime of mobile radio station like this.
(3). the sequence number difficult management
Sequence number is by counter SQN HSSProduce SQN ISIMChecking, SQN HSSIn home network, SQN ISIMAt mobile radio station.Two counters do not match and may be caused by the home network failure, i.e. SQN HSS<SQN ISIMAt this moment will abandon Ciphering Key, the heavy SQN that adjusts synchronously of initialization HSSValue.As long as sequence number is incorrect, the user just judges the home network synchronization failure, to the heavy synchronization request of home network initialization.This may cause false heavy synchronization request.Because sequence number does not necessarily just mean counter SQN in correct scope HSSFailure also may be caused by assailant a pair of RAND and the AUTN with mistake that reset, and Ciphering Key also may cause synchronization failure in the unordered use of S-CSCF, yet the user can not be distinguished the real causes of sequence number errors.And the weight of forging increased the overhead of signaling synchronously, and may delete untapped Ciphering Key.
Therefore, there is defective in prior art, and awaits improving and development.
Summary of the invention
The object of the present invention is to provide a kind of method of improved IP Multimedia System Authentication and Key Agreement, overcome the deficiency of above-mentioned prior art IMS AKA agreement, be redirection attack, network spoofing and sequence number difficult management, propose a kind of safer method of Authentication and Key Agreement more easily.
The technical scheme of method of the present invention is as follows:
A kind of method of improved IP Multimedia System Authentication and Key Agreement said method comprising the steps of: 0
(1). subscriber equipment sends a session initiation protocol registration information to Proxy Call Session Control Function, wherein comprise the open identity of privately owned identity of IP multimedia and IP multimedia, Proxy Call Session Control Function and query call conversation control function send to service call conversation control function to session initiation protocol registration message;
(2). the request of service call conversation control function hair user data is to Proxy Call Session Control Function, and Proxy Call Session Control Function sends first random number to subscriber equipment then;
(3). described subscriber equipment returns a response, sends second random number and message authentication code to service call conversation control function through Proxy Call Session Control Function and query call conversation control function;
(4). after receiving the user data response, service call conversation control function is to the home subscriber servers request authentication data of home network;
(5). the correctness of the message authentication code that described home subscriber servers checking is received, if be proved to be successful, return a collection of Ciphering Key and give service call conversation control function;
(6). service call conversation control function sends authentication request to subscriber equipment, comprise the 3rd random number, authentication marks, encryption key and Integrity Key, Proxy Call Session Control Function is stored these keys, and the 3rd random number and authentication marks are sent to subscriber equipment;
(7). the correctness of subscriber equipment check MAC Address, if authentication failed, the user refuses network; Otherwise the user continues to verify SQN or the RN that is included in the authentication marks IdxWhether can accept; If check successfully, subscriber equipment will calculate RES and send to Proxy Call Session Control Function so, and subscriber equipment also calculates encryption key and Integrity Key simultaneously; Proxy Call Session Control Function sends to the query call conversation control function to message, and wherein the query call conversation control function requires home subscriber servers to provide the address of service call conversation control function; The query call conversation control function sends to service call conversation control function to RES;
(8). service call conversation control function obtains Expected Response, and the RES that it and subscriber equipment are sent is compared, if identical, authentification of user success so.
Described method, wherein, described each Ciphering Key comprises following element: described the 3rd random number, Expected Response, encryption key, Integrity Key, and authentication marks.
Described method, wherein, described resist to reset two kinds of methods are arranged: as use SQN mechanism, then check SQN; As use RN IdxMechanism is then checked RN Idx
The method of a kind of improved IP Multimedia System Authentication and Key Agreement provided by the present invention is because network passes through U MACAnd the RES authenticated user, the user is by MAC and RN IdxThe checking network, if be proved to be successful, the user just can guarantee network or its home network so, or the visit net of being verified by home network; And, by checking RN Idx, the user guarantees that Ciphering Key is predetermined by this visit net, and does not have usedly in the past, can remove sequence number thus, gets rid of synchronously heavy; Resist redirection attack; Resist the destruction web influence, compare, well improved its three defectives with existing IMS AKA: redirection attack, network spoofing and sequence number difficult management, improved fail safe.
Description of drawings
Fig. 1 is an improved IMS AKA agreement schematic flow sheet of the present invention.
Embodiment
Below in conjunction with accompanying drawing the enforcement that improves protocol scheme is described in further detail.
The method of improved IP Multimedia System Authentication and Key Agreement of the present invention, as shown in Figure 1, it may further comprise the steps:
(1). subscriber equipment sends a session initiation protocol registration information to Proxy Call Session Control Function, wherein comprises the open identity of privately owned identity of IP multimedia and IP multimedia.Proxy Call Session Control Function and query call conversation control function send to service call conversation control function to session initiation protocol registration message; If the open identity IMPU of IP multimedia does not register in S-CSCF, S-CSCF is made as registered symbol uncertainly in HSS so, this means that the initialization registration carries out or do not complete successfully.If IMPU is registered, S-CSCF is arranged to registered to registered symbol so.Whether HSS detection IMPI and IMPU belong to same user simultaneously;
(2). service call conversation control function hair user data request user data request is to Proxy Call Session Control Function, and Proxy Call Session Control Function sends the first random number FRESH to subscriber equipment then;
(3). subscriber equipment returns a response user data response, sends the second random number R N and message authentication code U through Proxy Call Session Control Function and query call conversation control function MACGive service call conversation control function, wherein U MAC=F k(FRESH||RN||ID SN);
(4). after receiving the user data response, service call conversation control function comprises ID to the home subscriber servers HSS of home network request authentication data Authentication data request U, FRESH, RN, U MAC
(5). the U that home subscriber servers HSS checking is received MACCorrectness, if authentication failed, HSS returns a refusal notice, comprises ID U, in a single day FRESH and RN. have notice, the S-CSCF refusal.If be proved to be successful, return a collection of Ciphering Key and give service call conversation control function S-CSCF, (RAND, XRES, IK, CK, AUTN) ....Each Ciphering Key comprises following element: one the 3rd random number RA ND, Expected Response XRES, encryption key CK, Integrity Key IK and authentication token string AUTH, wherein XRES=F k(RAND), IK=G k(RAND), CK=G k /(RAND), AUTN=idx||RN Idx|| MAC, 1≤idx≤m, RN Idx=H k(idx||RN), MAC=F k(RAND||idx||RN Idx);
(6). service call conversation control function sends authentication request Auth_request to subscriber equipment, comprises random number RA ND, authentication marks AUTN, encryption key CK and Integrity Key IK.Proxy Call Session Control Function is stored these keys, and random number RA ND and authentication marks AUTN are sent to subscriber equipment;
(7). the correctness of subscriber equipment check MAC, if authentication failed, the user refuses network.Otherwise the user continues to verify SQN or the RN that is included among the AUTN IdxWhether can accept.If check successfully, subscriber equipment will calculate RES, RES=F so k(RAND) and send user authentication response to Proxy Call Session Control Function P-CSCF.Subscriber equipment also calculates encryption key and Integrity Key simultaneously; Proxy Call Session Control Function sends to the query call conversation control function to message, and wherein the query call conversation control function requires HSS to provide the address of service call conversation control function.Then, the query call conversation control function sends to service call conversation control function to RES;
Resist anti-the playback herein two kinds of methods arranged:
1. use SQN mechanism, then check SQN
2. use RN IdxMechanism is checked RN Idx
(8). service call conversation control function obtains XRES, and the RES that it and subscriber equipment are sent is compared, if identical, authentification of user success so; If etc., then do not refuse.
In the method for the invention, network passes through U MACAnd the RES authenticated user, the user is by MAC and RN IdxThe checking network.If be proved to be successful, the user just can guarantee network or its home network so, or the visit net of being verified by home network.And, by checking RN Idx, the user guarantees that Ciphering Key is predetermined by this visit net, and does not use in the past.
Below explain technique effect of the present invention:
1. remove sequence number, get rid of synchronously heavy
Use RN IdxCan resist Replay Attack, avoid the synchronization mechanism of UMTS AKA.RN IdxVerification method as follows: each RN IdxCan only be with once, each RN IdxAs a nonce.User side is safeguarded a unworn nonce tabulation, and each tabulation is by the ID of network SNPoint out.After receiving user data requests, the user uses RN and U MACResponse.The user calculates nonce response order RN then Idx=H k(idx||RN), and the nonce of this calculating be added to ID NiIn the tabulation of indication.The RN that receives when user rs authentication IdxThe time, whether only need check RN IdxAt ID NiIn the tabulation of indication.If do not exist, RN IdxUnacceptable; Otherwise, can accept.Accepting under the situation, the user is RN IdxDeletion from tabulation.
2. resist the effect of redirection attack
The user safeguards (RN, an ID in his database SN) record.By checking U MAC, home network guarantees that the user is really at his visit net.When producing Ciphering Key, home network is inserted RN IdxIn Ciphering Key, RN IdxBe that RN adds an index.After receiving the Ciphering Key request, the user judges what whether this vector was sent by its visit net, because the user can verify the RN that comprises in whether asking IdxBe to derive from the RN that sends to S-CSCF.Therefore, this method can be resisted redirection attack, has improved the defective of original IMS AKA.
3. resist the effect of destroying web influence
Suppose that the visit net is destroyed, the assailant can listen to the information of any transmission and acceptance, and the information of making up sends to S-CSCF.But because assailant's access authentication vector, he just can imitate the visit net and the user sets up communication session certainly.He also can imitate any subscriber of visit net.The home network of now supposing user U does not have to destroy, and user U roams into a visit net that does not have destruction.Want analog subscriber U, the assailant must send it back a correct response RES according to authentication request.Yet the user can not obtain RES from destroying net, transmits between HSS and S-CSCF because comprise the Ciphering Key of RES, does not relate to the visit net, so the assailant can't analog subscriber.Next whether, having a look the assailant can analog network, have two kinds may:
A. suppose that the user visited in the past and destroy network and assailant the Ciphering Key of not using that it was scheduled to is arranged.The assailant can use these Ciphering Key simulation visited network so.With to resist redirection attack similar, not that not destroy network predetermined because the user can verify out Ciphering Key, simulation will be failed.
B. suppose that the assailant does not have user's Ciphering Key, the assailant is by sending FRESH and ID SNBegin authentication to the user, the user uses RN and U MACResponse.The assailant is the consumer premise Ciphering Key by destroying network then.Yet by checking U MAC, HSS can judge the user not in not destroying network, refuses this request.
Adopt this method, compare, well improved its three defectives with existing IMS AKA: redirection attack, network spoofing and sequence number difficult management, improved fail safe.
Should be understood that the above-mentioned description at specific embodiment of the present invention is comparatively concrete, can not therefore be interpreted as the restriction to scope of patent protection of the present invention, scope of patent protection of the present invention should be as the criterion with claims.

Claims (3)

1, a kind of method of improved IP Multimedia System Authentication and Key Agreement said method comprising the steps of:
(1). subscriber equipment sends a session initiation protocol registration message to the Proxy Call Session Control Function unit, wherein comprise the open identity of privately owned identity of IP multimedia and IP multimedia, Proxy Call Session Control Function unit and query call conversation control function unit send to the service call conversation control function unit to session initiation protocol registration message;
(2). the hair user data request of service call conversation control function unit is to the Proxy Call Session Control Function unit, and the Proxy Call Session Control Function unit sends first random number to subscriber equipment then;
(3). described subscriber equipment returns a response, sends second random number and message authentication code to the service call conversation control function unit through Proxy Call Session Control Function unit and query call conversation control function unit;
(4). after receiving the user data response, the service call conversation control function unit is to the home subscriber servers request authentication data of home network;
(5). the correctness of the message authentication code that described home subscriber servers checking is received, if be proved to be successful, return a collection of Ciphering Key and give the service call conversation control function unit;
(6). the service call conversation control function unit sends authentication request to subscriber equipment, comprise the 3rd random number, authentication marks, encryption key and Integrity Key, these keys are stored in the Proxy Call Session Control Function unit, and the 3rd random number and authentication marks are sent to subscriber equipment;
(7). the correctness of subscriber equipment check MAC Address, if authentication failed, the user refuses network; Otherwise the user continues to verify SQN or the RN that is included in the authentication marks IdxWhether can accept; If check successfully, subscriber equipment will calculate RES and send to the Proxy Call Session Control Function unit so, and subscriber equipment also calculates encryption key and Integrity Key simultaneously; The Proxy Call Session Control Function unit sends to query call conversation control function unit to message, and wherein query call conversation control function unit requires home subscriber servers to provide the address of service call conversation control function unit; Query call conversation control function unit sends to the service call conversation control function unit to RES, and wherein SQN is a sequence number, RN IdxBe the response order, RES is response;
(8). the service call conversation control function unit obtains Expected Response, and the RES that it and subscriber equipment are sent is compared, if identical, authentification of user success so.
2, method according to claim 1 is characterized in that, described each Ciphering Key comprises following element: the 3rd random number, Expected Response, encryption key, Integrity Key, and authentication marks.
3, method according to claim 2 is characterized in that, resisting resets two kinds of methods: as use SQN mechanism, then check SQN; As use RN IdxMechanism is then checked RN Idx
CNB200510069328XA 2005-05-13 2005-05-13 A kind of method of improved IP Multimedia System Authentication and Key Agreement Expired - Fee Related CN100550902C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB200510069328XA CN100550902C (en) 2005-05-13 2005-05-13 A kind of method of improved IP Multimedia System Authentication and Key Agreement

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB200510069328XA CN100550902C (en) 2005-05-13 2005-05-13 A kind of method of improved IP Multimedia System Authentication and Key Agreement

Publications (2)

Publication Number Publication Date
CN1863194A CN1863194A (en) 2006-11-15
CN100550902C true CN100550902C (en) 2009-10-14

Family

ID=37390522

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB200510069328XA Expired - Fee Related CN100550902C (en) 2005-05-13 2005-05-13 A kind of method of improved IP Multimedia System Authentication and Key Agreement

Country Status (1)

Country Link
CN (1) CN100550902C (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101013937A (en) * 2007-02-08 2007-08-08 华为技术有限公司 Method and apparatus for preventing media proxy from hacker attack
CN101119381B (en) * 2007-09-07 2013-01-16 中兴通讯股份有限公司 Method and system for preventing playback attack
CN101527632B (en) * 2008-03-06 2011-12-28 华为技术有限公司 Method, device and system for authenticating response messages
CN101729532B (en) * 2009-06-26 2012-09-05 中兴通讯股份有限公司 Method and system for transmitting delay media information of IP multimedia subsystem
CN101626572B (en) * 2009-08-05 2011-12-07 中兴通讯股份有限公司 Information authentication method and information authentication system of transmission device management service
CN105827661B (en) * 2016-05-31 2020-05-19 宇龙计算机通信科技(深圳)有限公司 Method and device for secure communication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
US2003/0204608A1 2003.10.30

Also Published As

Publication number Publication date
CN1863194A (en) 2006-11-15

Similar Documents

Publication Publication Date Title
Lin et al. One-pass GPRS and IMS authentication procedure for UMTS
US7933591B2 (en) Security in a mobile communications system
US8457597B2 (en) Method for authenticating a mobile unit attached to a femtocell that operates according to code division multiple access
CN101272251B (en) Authentication and cryptographic key negotiation method, authentication method, system and equipment
EP2347613B1 (en) Authentication in a communication network
CN101030854B (en) Method and apparatus for inter-verifying network between multi-medium sub-systems
US8230035B2 (en) Method for authenticating mobile units attached to a femtocell that operates according to code division multiple access
CN100550902C (en) A kind of method of improved IP Multimedia System Authentication and Key Agreement
CN102006294A (en) IP multimedia subsystem (IMS) multimedia communication method and system as well as terminal and IMS core network
CN101640887A (en) Authentication method, communication device and communication system
Zhang et al. Dynamic group based authentication protocol for machine type communications
WO2009045310A2 (en) Method for authenticating a mobile unit attached to a femtocell that operates according to code division multiple access
Cao et al. UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE‐A Networks
Sharma et al. Improved IP multimedia subsystem authentication mechanism for 3G-WLAN networks
US20040043756A1 (en) Method and system for authentication in IP multimedia core network system (IMS)
CN100459804C (en) Device, system and method of authenticating when terminal to access second system network
Ahmadian et al. New attacks on UMTS network access
CN107454045A (en) A kind of method, apparatus and system of the certification of user's IMS registration
CN101198148B (en) Information distribution method for mobile terminal
CN1802029A (en) Method and apparatus for realizing bidirectional authentication of terminal and network using SIM card
CN101651677A (en) Method for solving IMS network DNS spoofing attack based on chaos encryption algorithm
CN105704716A (en) VoWi-Fi network access method and device
CN101232707B (en) Method for distinguishing subscriber terminal authority identifying type in IMS network and I-CSCF
RU2384018C2 (en) Expansion of signaling communications protocol
CN101662475A (en) Authentication method of accessing WAPI terminal into IMS network, system thereof and terminal thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20091014

Termination date: 20190513

CF01 Termination of patent right due to non-payment of annual fee